Internet

Results: 217023



#Item
91

Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗ Computer Science and Engineering, UC Sa

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2018-09-13 19:48:51
    92Internet architecture / Computing / Internet / Network architecture / Border Gateway Protocol / Forwarding plane / IP routing / Routing / Control plane / Cyclone Sidr / Forwarding / Peering

    SDX-Based Flexibility or Internet Correctness? Pick Two! R¨udiger Birkner, Arpit Gupta?, Nick Feamster?, Laurent Vanbever  ETH Z¨urich ?Princeton University

    Add to Reading List

    Source URL: nsg.ee.ethz.ch

    Language: English - Date: 2017-04-17 08:02:50
    93Computing / System software / Utility software / Internet protocols / Internet Control Message Protocol / Network layer / Traceroute / Transmission Control Protocol / Ping / ZMap / Computer network security / Computer security software

    Scanning the Internet for Liveness Shehar Bano Philipp Richter Mobin Javed

    Add to Reading List

    Source URL: sheharbano.com

    Language: English - Date: 2018-05-02 07:21:22
    94Internet censorship / Privacy / Censorship

    A Look at the Consequences of Internet Censorship through an ISP Lens Sheharbano Khattak (University of Cambridge)! Mobin Javed (UC Berkeley) Syed Ali Khayam (PLUMgrid)

    Add to Reading List

    Source URL: sheharbano.com

    Language: English - Date: 2017-02-16 07:58:53
    95Cryptography / Computing / Computer security / Cryptocurrencies / Emerging technologies / Decentralization / Trusted computing / Internet of things / Blockchain / Trusted Platform Module / Trusted execution environment / Smart contract

    Empowering the Economy of Things Mathias Davidsen, Sebastian Gajek, Marvin Kruse and Sascha Thomsen weeve.network Abstract The Internet of Things (IoT) paradigm is filled with opportunities due to the fact that things ca

    Add to Reading List

    Source URL: weeve.network

    Language: English - Date: 2018-10-20 14:31:57
    96Computing / Internet architecture / Network architecture / Information and communications technology / Multipath TCP / Routing / Network socket / Computer network / Forwarding plane / IP routing / Router / Internet protocol suite

    Adding Path Awareness to the Internet Architecture

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    97Computer network security / Cyberwarfare / Computer security / Computing / Computer security software / Idle scan / Denial-of-service attack / Transmission Control Protocol / Stateful firewall / Internet censorship / Great Firewall / Internet protocol suite

    Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:26
    98Business / Economy / PricewaterhouseCoopers / Out-of-home advertising / Ooh / Advertising

    Fig 6-Rising mobile Internet and connected device penetration is boosting research opportunities

    Add to Reading List

    Source URL: www.pwc.com

    Language: English
    99

    PDF Document

    Add to Reading List

    Source URL: www.rana-internet.de

    - Date: 2010-10-02 01:28:35
      100

      PDF Document

      Add to Reading List

      Source URL: www.rana-internet.de

      - Date: 2010-09-26 00:12:53
        UPDATE