Rossow

Results: 72



#Item
31Drinking culture / Alcoholic beverage / Alcohol advertising / Wine / Health effects of wine / Alcopop / Unit of alcohol / Cider / Alcoholism / Alcohol / Medicine / Household chemicals

Research report INGEBORG ROSSOW Challenges in an

Add to Reading List

Source URL: www.nordicwelfare.org

Language: English - Date: 2014-06-30 06:32:14
32Cyberwarfare / Computer security / Transmission Control Protocol / Network protocols / Denial-of-service attack / NetBIOS / SYN flood / Internet Protocol / Port / Computer network security / Denial-of-service attacks / Computing

Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany Abstrac

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-01-15 11:58:11
33Network architecture / Denial-of-service attacks / Internet / Cyberwarfare / Internet standards / Denial-of-service attack / Transmission Control Protocol / NetBIOS / Network Time Protocol / Computing / Internet protocols / Computer network security

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum Abstract Amplification vu

Add to Reading List

Source URL: syssec.rub.de

Language: English - Date: 2014-07-23 03:58:14
34Internet / Network architecture / Internet standards / Computer network security / Network protocols / Denial-of-service attack / Network Time Protocol / Transmission Control Protocol / NetBIOS / Computing / Internet protocols / Denial-of-service attacks

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz, Ruhr-University Bochum https://www.usenix.org/conference/usenixsecurity14/technical-

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-01-15 03:35:06
35Cyberwarfare / Computer security / Transmission Control Protocol / Network protocols / Denial-of-service attack / NetBIOS / SYN flood / Internet Protocol / Port / Computer network security / Denial-of-service attacks / Computing

Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany Abstrac

Add to Reading List

Source URL: syssec.rub.de

Language: English - Date: 2014-07-23 03:55:46
36Malware / Computing / Rootkit / Botnet / Fast flux / Computer virus / Antivirus software / Cyberwarfare / Computer security

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook Christian Rossow∗‡ , Christian J. Dietrich∗ , Chris Grier†§ , Christian Kreibich†§ , Vern Paxson†§ , Norbert Pohlmann∗ , Herber

Add to Reading List

Source URL: christian-rossow.de

Language: English - Date: 2012-03-17 04:52:06
37

Title: Creating UTH-Related FCDRs from IR and Microwave Sensors Cross-Calibrated by In Situ Measurements from Commercial Aircraft Investigator(s): Zhengzhao “Johnny” Luo (PI) William B. Rossow, CUNY

Add to Reading List

Source URL: www1.ncdc.noaa.gov

Language: English - Date: 2014-01-16 13:22:25
    38Arms control / Energy in India / Nuclear energy in India / Nuclear proliferation / U.S.–India Civil Nuclear Agreement / India–United States relations / Bharatiya Janata Party / Foreign relations of India / South Asian foreign policy of the Barack Obama administration / International relations / Contemporary history / India

    Microsoft Word - Rossow_Testimony_SFRC_7[removed]docx

    Add to Reading List

    Source URL: www.foreign.senate.gov

    Language: English - Date: 2014-07-14 15:34:12
    39One-time password / Security token / Two-factor authentication / Malware / Transaction authentication number / Online banking / Man-in-the-browser / Dropbox / Twitter / Computing / Software / Computer security

    Intel® Technology Journal | Volume 18, Issue 4, 2014 Security Analysis of Mobile Two-Factor Authentication Schemes Contributors Alexandra Dmitrienko

    Add to Reading List

    Source URL: www.christian-rossow.de

    Language: English - Date: 2014-08-06 03:20:34
    40

    A Weather-State Approach to Understanding the Coupling of the Climate System by Energy and Water Exchanges William B. Rossow, CREST Institute at CCNY Yuanchong Zhang, Columbia University

    Add to Reading List

    Source URL: gewex.org

    - Date: 2014-08-01 15:38:23
      UPDATE