Defense Security Service

Results: 807



#Item
71Computer crimes / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Partnership for Public Service / United States Department of Homeland Security / Comprehensive National Cybersecurity Initiative / Booz Allen Hamilton / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Computer security / Security

Cyber In-Security II: Closing the Federal Talent Gap

Add to Reading List

Source URL: www.federalnewsradio.com

Language: English - Date: 2015-04-13 18:03:02
72Software / Denial-of-service attacks / Code Red / Computer worms / Denial-of-service attack / Computer virus / Hosts / SQL Slammer / Anti-worm / System software / Computer network security / Cyberwarfare

How to 0wn the Internet in Your Spare Time Stuart Staniford Silicon Defense Eureka, CA

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2002-04-09 16:51:09
73Wireless / Computing / IEEE 802.1X / Wardriving / Service set / Wi-Fi / Hotspot / Wireless security / Wireless networking / Computer network security / Technology

Rogue AP 101 Threat, Detection, & Defense Beetle <> Bruce Potter <> Coming up...

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
74Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Firewall / Internet security / Transmission Control Protocol / Traceroute / Black hole / Computer network security / Cyberwarfare / Denial-of-service attacks

BENCHMARKS FOR DDOS DEFENSE EVALUATION Jelena Mirkovic, Erinc Arikan and Songjie Wei University of Delaware Newark, DE Roshan Thomas SPARTA, Inc.

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-11-28 14:50:49
75Network architecture / Denial-of-service attack / Traffic classification / Peer-to-peer / IP traceback / Packet switching / Distributed firewall / IP address spoofing / Flooding / Computer network security / Computing / Internet

A Framework for A Collaborative DDoS Defense George Oikonomou, Jelena Mirkovic University of Delaware oikonomo,

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-11-28 14:29:34
76Cyberspace / Denial-of-service attack / IP address spoofing / SYN flood / UDP flood attack / Smurf attack / Firewall / Transmission Control Protocol / Internet security / Computer network security / Denial-of-service attacks / Computing

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗ Jelena Mirkovic

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2005-06-22 14:30:02
77Cyberwarfare / Computer security / Network performance / Denial-of-service attack / Internet Relay Chat / IP address spoofing / Robust random early detection / Transmission Control Protocol / Firewall / Computer network security / Denial-of-service attacks / Computing

Source-End DDoS Defense∗ Jelena Mirkovi´c Gregory Prier Peter Reiher University of California Los Angeles Computer Science Department 3564 Boelter Hall Los Angeles, CA 90095, USA

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-05-20 19:43:47
78Denial-of-service attack / Cyberspace / Internet security / SYN flood / Stefan Savage / Denial-of-service attacks / Computer network security / Computing

A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms Jelena Mirkovic, Janice Martin and Peter Reiher Computer Science Department University of California, Los Angeles Technical report #020018

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-05-01 03:16:24
79BB gun / Military technology / Destruction / Security / The Pentagon / United States Air Force / United States Department of Defense

U.S. Unaccounted-For from the Vietnam War Report for: Florida Prisoners of War, Missing in Action and Killed in Action/Body not Recovered Military Service

Add to Reading List

Source URL: www.dpaa.mil

Language: English - Date: 2015-04-15 11:51:06
80Internet / Akamai Technologies / Denial-of-service attack / Network architecture / Speedera Networks / Denial-of-service attacks / Prolexic Technologies / Computing

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Routed DDoS defense for protecting data center infrastructures against large, complex attacks Organizations increasingly interact with customers, employees and pa

Add to Reading List

Source URL: www.prolexic.com

Language: English
UPDATE