Internet Protocol Control Protocol

Results: 2856



#Item
361Network performance / Cyberwarfare / Denial-of-service attacks / Pseudorandom number generator / Measuring network throughput / Network packet / Denial-of-service attack / Network telescope / Witty / Transmission Control Protocol / Code Red / Packet loss

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
362Routing / Computer networking / Internet Standards / Internet protocols / Route reflector / Border Gateway Protocol / BGP confederation / Control plane / Router / Convergence

iBGP Deceptions: More Sessions, Fewer Routes Stefano Vissicchio†§ Luca Cittadini† Laurent Vanbever‡ Olivier Bonaventure‡ † Roma Tre University § GARR Consortium ‡ Universit´e catholique de Louvain † {vis

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2013-06-26 09:06:45
363Internet privacy / Secure communication / Computer networking / Cryptographic protocols / Transport Layer Security / Proxy server / Transmission Control Protocol / HTTPS / Internet protocol suite / Session Initiation Protocol

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2016-01-05 05:04:04
364Computing / Computer architecture / Transmission Control Protocol / Infrared / Internet protocol suite / Electromagnetism

O t h e r G L O BA L CA C H É P r o d u c t s CONNECT ALMOST ANY DEVICE TO THE NETWORK. IN MINUTES. N e t wo r k Ad a p t e r s. C o n n e c t i v i t y P ro d u c t s. I R L e a r n e r s.

Add to Reading List

Source URL: www.globalcache.com

Language: English - Date: 2010-06-18 12:56:31
365Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-11-02 11:01:00
366Computing / Network performance / Computer network security / Computer security / Internet privacy / Transmission Control Protocol / Packet loss / Proxy server / Deep packet inspection / Voice over IP / Traffic shaping / Firewall

Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-09-04 16:00:20
367Internet protocols / Secure communication / Internet Standards / Transmission Control Protocol / Relay / Tor / Transport layer / Internet Relay Chat flood / HTTPS / Denial-of-service attack / Quality of service / Internet Relay Chat

IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2014-09-10 17:17:22
368Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2007-07-26 16:56:51
369Computing / Technology / Digital media / Network telescope / Internet / Darknet / Transmission Control Protocol / Scanner / Port scanner

An Internet-Wide View of Internet-Wide Scanning Zakir Durumeric, Michael Bailey, J. Alex Halderman University of Michigan USENIX  Security  ’14      ·∙      San  Diego,  CA

Add to Reading List

Source URL: zakird.com

Language: English
370Computing / Ethernet / Networking hardware / Internet protocol suite / Network architecture / Transmission Control Protocol / Network switch / Wi-Fi / Power over Ethernet / Dynamic Host Configuration Protocol

iTach Family of Products TCP/IP to IR, Serial, & Contact Closure with PoE Option CONNECT ALMOST ANY DEVICE TO AN ETHERNET NETWORK IN MINUTES. SIMPLY.

Add to Reading List

Source URL: www.globalcache.com

Language: English - Date: 2010-06-18 12:43:06
UPDATE