Denial of Peter

Results: 32



#Item
11Cyberwarfare / Computer security / Network performance / Denial-of-service attack / Internet Relay Chat / Traffic flow / Transmission Control Protocol / Network congestion / Firewall / Computer network security / Computing / Denial-of-service attacks

Attacking DDoS at the Source Jelena Mirkovi´c Gregory Prier Peter Reiher University of California Los Angeles Computer Science Department 3564 Boelter Hall Los Angeles, CA 90095, USA

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-08-30 17:46:01
12Computer network security / Network performance / Data / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Traffic flow / Network congestion / Transmission Control Protocol / Denial-of-service attacks / Computing / Network architecture

A Source Router Approach to DDoS Defense Jelena Mirkovic, Peter Reiher and Gregory Prier Computer Science Department University of California, Los Angeles Abstract

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-01-10 19:15:44
13Internet / Internet protocols / Teletraffic / Network performance / Computer network security / Transmission Control Protocol / Denial-of-service attack / SYN flood / Quality of service / Computing / Denial-of-service attacks / Network architecture

1 Accurately Measuring Denial of Service in Simulation and Testbed Experiments Jelena Mirkovic Member, IEEE, Alefiya Hussain, Sonia Fahmy Senior Member, IEEE, Peter Reiher Member, IEEE, Roshan K. Thomas

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2009-07-27 18:05:25
14Computing / Router / Reverse path forwarding / Forwarding information base / Routing table / Denial-of-service attack / Protocol Independent Multicast / Forwarding plane / Network architecture / Routing / Internet

iSAVE: Incrementally Deployable Source Address Validation ∗ Jelena Mirkovi´c, Zhiguo Xu, Jun Li, Matthew Schnaider, Peter Reiher, and Lixia Zhang Abstract Reliable information concerning the reverse path to a particul

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-09-28 19:29:54
15Cyberwarfare / Network architecture / Data security / IP address spoofing / Denial-of-service attack / SYN flood / Transmission Control Protocol / Ingress filtering / Firewall / Computer network security / Denial-of-service attacks / Computing

RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2010-12-13 19:36:16
16Cyberwarfare / Computer security / Network performance / Denial-of-service attack / Internet Relay Chat / IP address spoofing / Robust random early detection / Transmission Control Protocol / Firewall / Computer network security / Denial-of-service attacks / Computing

Source-End DDoS Defense∗ Jelena Mirkovi´c Gregory Prier Peter Reiher University of California Los Angeles Computer Science Department 3564 Boelter Hall Los Angeles, CA 90095, USA

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-05-20 19:43:47
17Denial-of-service attack / Cyberspace / Internet security / SYN flood / Stefan Savage / Denial-of-service attacks / Computer network security / Computing

A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms Jelena Mirkovic, Janice Martin and Peter Reiher Computer Science Department University of California, Los Angeles Technical report #020018

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-05-01 03:16:24
18Computer security / Denial-of-service attack / IP address spoofing / Transmission Control Protocol / Firewall / Wake-on-LAN / Network address translation / Peer-to-peer / NTP server misuse and abuse / Computer network security / Computing / Cyberwarfare

Building Accountability into the Future Internet Jelena Mirkovic Peter Reiher Information Sciences Institute

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2008-11-14 17:58:58
19Software bugs / Internet standards / Units of information / Denial-of-service attacks / SQL Slammer / Computer network security / Witty / Stack buffer overflow / User Datagram Protocol / Computing / Network architecture / Internet

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS 2 CHIBA WITTY BLUES Peter Ferrie, Frédéric Perriot, Péter Ször Symantec, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
20Intergovernmental Panel on Climate Change / Climate change denial / Ian Plimer / Philip Stott / Global warming / Economics of global warming / Richard Lindzen / IPCC Third Assessment Report / The Great Global Warming Swindle / Climate change / Environmental skepticism / Environment

ETHICS AND CLIMATE CHANGE POLICY Peter Lee With a foreword by Dr Peter Forster, Bishop of Chester

Add to Reading List

Source URL: www.thegwpf.org

Language: English - Date: 2014-12-16 04:52:06
UPDATE