Protocol analysis

Results: 1021



#Item
281Mkdir / Folder / Hail spike / Espionage / Cryptography / Computing / Enigma machine

Protocol for TBSS analysis using the ENIGMA-DTI template *Last update APRIL 2014* Neda Jahanshad, Emma Sprooten, Peter Kochunov , The following steps will allow you to re

Add to Reading List

Source URL: enigma.ini.usc.edu

Language: English - Date: 2014-05-01 02:33:48
282Internet standards / Routing / Internet protocols / Border Gateway Protocol / Traceroute / Hop / Cooperative Association for Internet Data Analysis / Network architecture / Internet / Computing

Path Stitching: Internet-Wide Path and Delay Estimation from Existing Measurements DK Lee, Keon Jang, Changhyun Lee, Sue Moon, Gianluca Iannaccone*

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:46:17
283IPv6 / Cooperative Association for Internet Data Analysis / Transmission Control Protocol / Computing / Network architecture / Internet Protocol / OSI protocols

DHS PREDICT project: CAIDA update Bradley Huffaker PI k claffy, CAIDA SRI

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-04-24 17:48:30
284Carbon finance / United Nations Framework Convention on Climate Change / Environment / Nuclear power / Kyoto Protocol / International reaction to the Fukushima Daiichi nuclear disaster / Nuclear power phase-out / Energy / Nuclear technology / Carbon dioxide

IT JUST AIN’T “COOL”! TENATIVE ANALYSIS JAPAN’S NEW “COOL EARTH” TARGET -3.8% COMPARED TONovemberWHAT IS THE AMBITION LEVEL OF THE NEW TARGET?

Add to Reading List

Source URL: awsassets.panda.org

Language: English - Date: 2013-11-14 08:07:46
285OSI protocols / Internet standards / Computer network security / Real-time Transport Protocol / Streaming / UDP Lite / Internet protocols / Network architecture / Computing

Universal Payload Analysis Extract valuable data communicated over virtually any TCP-based or UDP-based protocol EXAMPLE USE CASES • Performance monitoring

Add to Reading List

Source URL: www.extrahop.com

Language: English - Date: 2014-09-30 01:15:54
286Internet standards / Internet protocols / Routing protocols / Traceroute / Computer networking / Border Gateway Protocol / Cooperative Association for Internet Data Analysis / Routing / Hop / Internet / Computing / Network architecture

Microsoft PowerPoint - 2009caidawidecasfi-sibilla.pptx

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:46:18
287Internet Protocol / Network architecture / IPv6

’s Topology Updates and Analysis Bradley Huffaker CAIDACAIDA/WIDE/CASFI Workshop (Korea)

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:46:18
288Web browsers / Internet protocols / Web development / SPDY / HTTP / HTTP pipelining / Hypertext Transfer Protocol / Transmission Control Protocol / Push technology / Computing / Software / World Wide Web

ACCESS NETWORK TECHNOLOGIES ANALYSIS OF GOOGLE SPDY AND TCP INITCWND prepared by Greg White

Add to Reading List

Source URL: www.cablelabs.com

Language: English - Date: 2014-05-02 16:14:30
289Routing / Internet protocols / Internet standards / Border Gateway Protocol / Internet service provider / Autonomous system / Peering / Internet transit / IP hijacking / Internet / Network architecture / Computing

Internet Routing Vulnerability Doug Madory, Director of Internet Analysis, Dyn Kaspersky Security Analyst Summit Cancun, Mexico February 17, 2015

Add to Reading List

Source URL: research.dyn.com

Language: English - Date: 2015-02-18 15:30:24
290Internet standards / Internet protocols / Routing protocols / Border Gateway Protocol / Router / Internet / Network architecture / Computing

Analysis of probably redundant more specific announcements in BGP Julien Gilon University of Liège - CAIDA

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-03-31 18:19:27
UPDATE