<--- Back to Details
First PageDocument Content
Computing / Information and communications technology / Computer network security / Networking hardware / Computer networking / Data transmission / Computer security / Firewall software / Middlebox / Computer appliance / Packet processing / Computer network
Date: 2013-04-22 15:35:26
Computing
Information and communications technology
Computer network security
Networking hardware
Computer networking
Data transmission
Computer security
Firewall software
Middlebox
Computer appliance
Packet processing
Computer network

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Download Document from Source Website

File Size: 724,13 KB

Share Document on Facebook

Similar Documents

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

DocID: 1xVqa - View Document

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

DocID: 1xUDb - View Document

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

DocID: 1v7im - View Document

Managing Computer Security Incident Response Teams (CSIRTs)  “Can you business survive and recover from network attacks and intruder threats?”

Managing Computer Security Incident Response Teams (CSIRTs) “Can you business survive and recover from network attacks and intruder threats?”

DocID: 1uOLO - View Document

Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

DocID: 1uMv5 - View Document