<--- Back to Details
First PageDocument Content
Computer networking / Network protocols / Cyberwarfare / Denial-of-service attacks / Routing / Mobile IP / Content centric networking / IPv6 / Internet Protocol / Peer-to-peer / IP address / Network layer
Date: 2013-02-18 11:45:51
Computer networking
Network protocols
Cyberwarfare
Denial-of-service attacks
Routing
Mobile IP
Content centric networking
IPv6
Internet Protocol
Peer-to-peer
IP address
Network layer

Where is in a name? A Survey of Mobility in Information-Centric Networks Gareth Tyson1 , Nishanth Sastry2 , Ruben Cuevas3 , Ivica Rimac4 , and Andreas Mauthe5 1 2

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Download Document from Source Website

File Size: 340,40 KB

Share Document on Facebook

Similar Documents

DDoS Protection and Mitigation 	Powerful, real-time DDoS protection and mitigation DDoS attacks growing in size Distributed denial of service (DDoS) attacks are getting bigger and more disruptive. These attacks can outst

DDoS Protection and Mitigation Powerful, real-time DDoS protection and mitigation DDoS attacks growing in size Distributed denial of service (DDoS) attacks are getting bigger and more disruptive. These attacks can outst

DocID: 1xV1A - View Document

Interactive	Analysis	of	SDN-driven	 defence against	Distributed	 Denial	of	Service	attacks Ralph	Koning,	Ben	de	Graaff, Cees	de	Laat,	Robert	Meijer,	Paola	Grosso University	of	Amsterdam

Interactive Analysis of SDN-driven defence against Distributed Denial of Service attacks Ralph Koning, Ben de Graaff, Cees de Laat, Robert Meijer, Paola Grosso University of Amsterdam

DocID: 1uumK - View Document

Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity Nikita Borisov George Danezis

Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity Nikita Borisov George Danezis

DocID: 1u4AJ - View Document

Whitepaper  Distributed Denial of Service (DDoS) If a DDoS attack occurs, what is the cost to your business? Denial of Service (DoS) attacks in various forms have existed for decades

Whitepaper Distributed Denial of Service (DDoS) If a DDoS attack occurs, what is the cost to your business? Denial of Service (DoS) attacks in various forms have existed for decades

DocID: 1sIEn - View Document

Position Paper Title: Denial of Information Attacks Calton Pu College of Computing, Georgia Institute of Technology 1. Introduction Quality of Service (QoS) is an important requirement in many high performance

Position Paper Title: Denial of Information Attacks Calton Pu College of Computing, Georgia Institute of Technology 1. Introduction Quality of Service (QoS) is an important requirement in many high performance

DocID: 1s6Sy - View Document