Internet Protocol Control Protocol

Results: 2856



#Item
331Computing / Network performance / Network management / Network architecture / Internet Standards / Explicit Congestion Notification / Flow control / IPv4 / Traceroute / Middlebox / Communications protocol / Internet Protocol

Observing Internet Path Transparency to Support Protocol Engineering Brian Trammell Mirja Kühlewind

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2016-01-05 05:04:04
332Denial-of-service attacks / Cyberwarfare / Computing / Domain name system / Denial-of-service attack / Internet Relay Chat / Computer security / Internet activism / Transmission Control Protocol / Computer network security / TCP reset attack / Domain Name System Security Extensions

JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-06-29 20:52:09
333Computing / Software / Internet protocols / Internet Standards / Communication software / Cross-platform software / KakaoTalk / Domain Name System / Transmission Control Protocol / Firewall / Hypertext Transfer Protocol

The Citizen Lab Research Brief JulyAsia Chats: LINE and KakaoTalk Disruptions in China

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:17
334Computing / Network architecture / Internet / Routing / Computer networking / Internet Standards / Internet protocols / Border Gateway Protocol / Route reflector / Router / Control plane / Distance-vector routing protocol

Using Routers to Build Logic Circuits: How Powerful is BGP? Marco Chiesa? Luca Cittadini? ?

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2013-08-22 11:30:09
335Internet Standards / Internet protocols / Internet security / Secure communication / Dark web / Tor / Transmission Control Protocol / Internet privacy / Internet Relay Chat / Padding

Google Summer of Code Proposal: A Framework for Website Fingerprinting Countermeasures   Marc Juarez Miro ()

Add to Reading List

Source URL: securehomes.esat.kuleuven.be

Language: English - Date: 2014-04-22 05:29:47
336Computing / Internet / Network architecture / Internet protocols / Internet Standards / Stream Control Transmission Protocol / Transport layer / Tor / Transmission Control Protocol / Internet Protocol

Datagram Testing Plan Steven J. Murdoch Tor Tech ReportMarch 16, 2012

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-26 02:02:15
337Internet security / Internet Standards / Internet protocols / Secure communication / Dark web / IP hijacking / Tor / Border Gateway Protocol / Traffic analysis / Denial-of-service attack / Transmission Control Protocol

RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2015-03-17 04:19:13
338Network performance / Computing / Network management / Internet security / System software / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol

Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

Add to Reading List

Source URL: icir.org

Language: English - Date: 2015-04-22 12:30:04
339Internet privacy / Hypertext Transfer Protocol / World Wide Web / Computing / Computer access control / HTTP cookie / Digital media / Google Analytics / Privacy / Session / Zombie cookie / Secure cookies

COOKIES POLICY – Extended statement What are cookies? Cookies are small text strings that the websites visited send to the devices, where they are stored and relayed once the user visits the website again. Cookies may

Add to Reading List

Source URL: mymoleskine.moleskine.com

Language: English - Date: 2015-08-06 05:23:01
340Computing / Internet protocols / Network architecture / Computer network security / Cyberwarfare / Transmission Control Protocol / HTTP cookie / Port / Network packet / Firewall / Network socket / Application layer

Protocol-Independent Adaptive Replay of Application Dialog Weidong Cui† , Vern Paxson‡ , Nicholas C. Weaver‡ , Randy H. Katz† † University of California, Berkeley, CA ‡ International Computer Science Institut

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:00
UPDATE