P Router

Results: 58



#Item
51IP address / Internet protocol suite / Internet Protocol / Router / Transmission Control Protocol / Communications protocol / Internet standards / Network address translation / IPv4 address exhaustion / Network architecture / Internet / Computing

ANDREW M. CUOMO Governor Empire State Plaza P.O. Box 2062 Albany, NY[removed]

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2013-06-27 14:45:30
52Routing protocols / Internet protocols / Denial-of-service attacks / Computer network security / Internet standards / Router / Denial-of-service attack / Open Shortest Path First / Tor / Computing / Network architecture / Internet

Resistance is Not Futile: Detecting DDoS Attacks without Packet Inspection Arjun P. Athreya, Xiao Wang, Yu Seung Kim, Yuan Tian and Patrick Tague Wireless Network and System Security Group, Carnegie Mellon University, US

Add to Reading List

Source URL: wnss.sv.cmu.edu

Language: English - Date: 2013-08-12 14:06:30
53Routing protocols / Routing / Internet protocols / Internet standards / Networking hardware / Router / Forwarding plane / Traffic flow / IP address spoofing / Network architecture / Internet / Computing

Packet Forwarding with Source Verification Craig A. Shue Minaxi Gupta Matthew P. Davy

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-03-15 16:22:14
54IP address / Internet protocol suite / Internet Protocol / Router / Transmission Control Protocol / Communications protocol / Internet standards / Network address translation / IPv4 address exhaustion / Network architecture / Internet / Computing

ANDREW M. CUOMO Governor Empire State Plaza P.O. Box 2062 Albany, NY[removed]

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2013-06-27 14:45:30
55Software / Ntop / Network intrusion detection system / Denial-of-service attack / Transmission Control Protocol / Router / Ping / Communications protocol / Intrusion detection system / Computing / System software / Computer network security

Improving Network Security Using Ntop Luca Deri1,2 and Stefano Suin2 Finsiel S.p.A1., Via Matteucci 34/b, Pisa, Italy. 2 Centro Serra , University of Pisa, University of Pisa, Lungarno Pacinotti 43, Pisa, Italy.

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2008-12-17 19:32:32
56Netflow / Network management / Networking hardware / Ntop / Traffic flow / Router / Juniper Networks / Network traffic measurement / FlowMon / System software / Computing / Software

nProbe: an Open Source NetFlow Probe for Gigabit Networks Luca Deri NETikos S.p.A. Via Matteucci 34/b[removed]Pisa, Italy

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2008-12-17 19:32:21
57Networking hardware / Server appliance / Cisco IOS / Routers / Static routing / Virtual LAN / Cisco Systems / Cisco / Virtual Router Redundancy Protocol / Computing / Routing / Network architecture

C H A P T E R 1 Basic Router Configuration This chapter provides procedures for configuring the basic parameters of your Cisco router, including

Add to Reading List

Source URL: www.redesyseguridad.es

Language: English - Date: 2013-06-28 06:43:51
58Routing protocols / Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / Router / Default-free zone / Path vector protocol / Network architecture / Internet / Computing

CONTRIBUTED P A P E R

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-01-15 18:56:25
UPDATE