<--- Back to Details
First PageDocument Content
Cyberwarfare / Honeypot / Honeyd / Network telescope / Network address translation / Denial-of-service attack / Dynamic Host Configuration Protocol / Client honeypot / Computer network security / Internet / Computing
Date: 2006-09-07 19:03:47
Cyberwarfare
Honeypot
Honeyd
Network telescope
Network address translation
Denial-of-service attack
Dynamic Host Configuration Protocol
Client honeypot
Computer network security
Internet
Computing

INTERNATIONAL COMPUTER SCIENCE INSTITUTE 1947 Center St. • Suite 600 • Berkeley, California • ( • FAXGQ: Realizing a System to Catch Worms in a Quarter Million Places

Add to Reading List

Source URL: research.microsoft.com

Download Document from Source Website

File Size: 2,22 MB

Share Document on Facebook

Similar Documents

A Coordinated Approach to K2/Campaign 9: Microlensing Data Reduction and Analysis. Rachel Street Las Cumbres Observatory Global Telescope Network, Inc. The phenomenon of microlensing offers us a glimpse of dark and other

A Coordinated Approach to K2/Campaign 9: Microlensing Data Reduction and Analysis. Rachel Street Las Cumbres Observatory Global Telescope Network, Inc. The phenomenon of microlensing offers us a glimpse of dark and other

DocID: 1uhWY - View Document

Development of Distributed e-VLBI Data Correlation Technologies in Ventspils International Radio Astronomy Center Normunds Jekabsons1, Karina Krinkele1, Ivars Shmeld1, Dominik Stoklosa222

Development of Distributed e-VLBI Data Correlation Technologies in Ventspils International Radio Astronomy Center Normunds Jekabsons1, Karina Krinkele1, Ivars Shmeld1, Dominik Stoklosa222

DocID: 1qPoY - View Document

Microsoft Word - TwoMountainModelDescriptionV5

Microsoft Word - TwoMountainModelDescriptionV5

DocID: 1nLSu - View Document

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

DocID: 1kvqF - View Document

An Internet-Wide View of Internet-Wide Scanning Zakir Durumeric, Michael Bailey, J. Alex Halderman University of Michigan  USENIX	
  Security	
  ’14	
  	
  	
  ·∙	
  	
  	
  San	
  Diego,	
  CA

An Internet-Wide View of Internet-Wide Scanning Zakir Durumeric, Michael Bailey, J. Alex Halderman University of Michigan USENIX  Security  ’14      ·∙      San  Diego,  CA

DocID: 1jUVC - View Document