Denial-of-service attack

Results: 1246



#Item
1

Whitepaper Distributed Denial of Service (DDoS) If a DDoS attack occurs, what is the cost to your business? Denial of Service (DoS) attacks in various forms have existed for decades

Add to Reading List

Source URL: www.nttsecurity.com

- Date: 2016-07-26 13:04:53
    2Avionics / Aviation / Air traffic control / Technology / Business / Automatic dependent surveillance  broadcast / Secondary surveillance radar / Flightradar24 / Computer network / DO-242A / IEEE 802.11 / Denial-of-service attack

    On the Security of the Automatic Dependent Surveillance-Broadcast Protocol arXiv:1307.3664v2 [cs.CR] 15 AprMartin Strohmeier∗ , Vincent Lenders+ , Ivan Martinovic∗

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2014-12-19 11:12:15
    3Software testing / Computer security / Computing / Software engineering / Codenomicon / Fuzz testing / Oulu University Secure Programming Group / Denial-of-service attack / Test automation / Security testing / American fuzzy lop / Fault injection

    Fuzzing Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-07-06 08:58:36
    4Computing / Network performance / Network architecture / Internet / Teletraffic / Cyberwarfare / Internet protocols / Transmission Control Protocol / Quality of service / Denial-of-service attack / Voice over IP / Traffic shaping

    Towards User-Centric Metrics for Denial-Of-Service Measurement Jelena Mirkovic Alefiya Hussain University of Delaware SPARTA, Inc. Peter Reiher

    Add to Reading List

    Source URL: www.lasr.cs.ucla.edu

    Language: English - Date: 2015-06-05 18:13:26
    5Security / Computing / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Denial-of-service attack / Threat / Critical infrastructure protection / Internet / Vulnerability

    An ideal Internet Early Warning System Dominique Petersen and Norbert Pohlmann Institute for Internet Security University of Applied Sciences Gelsenkirchen {petersen, pohlmann}@internet-sicherheit.de Abstract

    Add to Reading List

    Source URL: norbert-pohlmann.com

    Language: English - Date: 2015-10-20 12:57:45
    6Computing / Routing algorithms / Cyberwarfare / Concurrent computing / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer network / Multipath routing / Botnet / Routing / Crowds

    On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

    Add to Reading List

    Source URL: inspire.edu.gr

    Language: English - Date: 2016-04-22 11:14:02
    7Computing / Computer network security / Network architecture / Wireless networking / Local area networks / IEEE 802.11 / Computer security / IEEE 802.11e-2005 / Wireless security / Denial-of-service attack / Data link layer / Transmission Control Protocol

    Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

    Add to Reading List

    Source URL: www.winlab.rutgers.edu

    Language: English
    8Computing / Network architecture / Computer networking / Internet / IP traceback / Router / Traffic flow / Denial-of-service attack / Transmission Control Protocol / Packet loss / NetFlow

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-01-13 03:12:31
    9Computing / Network performance / Computer network security / Network management / Cyberwarfare / Multi-agent systems / Spamming / Botnet / Transmission Control Protocol / Traffic classification / Denial-of-service attack / Measuring network throughput

    C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-07-08 13:42:23
    10Computing / Computer security / Computer network security / E-commerce / Cyberwarfare / Information privacy / Payment Card Industry Data Security Standard / Cogeco / Web application firewall / Application firewall / Peer 1 / Denial-of-service attack

    COGECO_Peer_1_Logo_v2_WHITE

    Add to Reading List

    Source URL: www.cogecopeer1.com

    Language: English - Date: 2016-07-20 15:41:15
    UPDATE