Denial-of-service attacks

Results: 652



#Item
91Security / Political geography / OWASP / Uniform resource locator / Denial-of-service attacks / URL redirection / Denial-of-service attack / Paul Kagame / Rwanda / Computer security / Computing / Computer network security

=============================================== UFONet DDoS attacks via Web Abuseby psy

Add to Reading List

Source URL: ufonet.sourceforge.net

Language: English - Date: 2014-10-31 13:22:54
92Internet / Akamai Technologies / Denial-of-service attack / Network architecture / Speedera Networks / Denial-of-service attacks / Prolexic Technologies / Computing

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Routed DDoS defense for protecting data center infrastructures against large, complex attacks Organizations increasingly interact with customers, employees and pa

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 11:24:01
93Akamai Technologies / Content delivery network / Prolexic Technologies / Networks / Denial-of-service attack / Computing / Concurrent computing / Internet

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Flow-Based Monitoring Network-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with customers, em

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2015-04-06 03:50:01
94Akamai Technologies / Content delivery network / Prolexic Technologies / Networks / Denial-of-service attack / Computing / Concurrent computing / Internet

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Flow-Based Monitoring Network-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with customers, em

Add to Reading List

Source URL: www.akamai.de

Language: English
95Internet / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Akamai Technologies / Network architecture / Prolexic Technologies / Denial-of-service attacks / Computing / Computer network security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona DDoS Defender DDoS defense to protect websites against the increasing scale, frequency, and sophistication of attacks As businesses and other organizations move incre

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2015-04-13 05:52:02
96Computer security / Computing / Denial-of-service attack / Internet Relay Chat / UDP flood attack / Firewall / Stateful firewall / Deep packet inspection / Transmission Control Protocol / Computer network security / Denial-of-service attacks / Cyberwarfare

www.harppddos.com HARPP DDoS Mitigator Appliances and DDoS CERT provide cyber warfare intelligence with its best-of-breed DDI™ (Deep DDoS Inspection) technology for full protection of your network, web applications an

Add to Reading List

Source URL: labrisnetworks.com

Language: English - Date: 2014-04-16 07:41:05
97Telecommunications engineering / Technology / Denial-of-service attacks / Cyberwarfare / Channel access methods / Frequency-hopping spread spectrum / Spread spectrum / Communications jamming / Direct-sequence spread spectrum / OSI protocols / Multiplexing / Radio resource management

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3, pning, huaiyu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:11
98Denial-of-service attacks / Spamming / Cyberwarfare / Computer security / Botnets / Video game bot / DoSnet / Internet Relay Chat / Denial-of-service attack / Computer network security / Computing / Multi-agent systems

Botnets An Introduction Into the World of Botnets Tyler Hudak KoreLogic Security

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-05-27 15:39:14
99Computer network security / Nimda / SQL Slammer / Code Red II / Computer worm / Denial-of-service attack / Root name server / Code Red / Mydoom / Malware / System software / Denial-of-service attacks

Understanding Global Internet Health David Moore () January, 2003

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-28 14:54:20
100Relational database management systems / Cross-platform software / Database theory / Denial-of-service attacks / Software testing / Denial-of-service attack / SQL injection / Database security / Exploit / Computing / Data management / Software

Dealing with Database Denial of Service Version 1.0 Released: August 22, 2013

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-09-04 10:20:28
UPDATE