Back to Results
First PageMeta Content
Computing / Computer security / Denial-of-service attack / IP address spoofing / Smurf attack / Transmission Control Protocol / Traffic flow / Network congestion / Firewall / Computer network security / Denial-of-service attacks / Cyberwarfare


Document Date: 2009-07-01 14:12:54


Open Document

File Size: 351,14 KB

Share Result on Facebook

City

Houston / New York City / Anomaly / /

Company

Oxford University Press / Register.com / Yahoo / CNN / Dell / The New York Times / Amazon / eBay / BT / UltraDNS / Panix / Internet Corporation for Assigned Names / Microsoft / /

Country

Estonia / Norway / Pakistan / United Kingdom / Israel / Romania / Russia / United States / Georgia / South Korea / /

Currency

USD / /

/

Event

Natural Disaster / Product Issues / /

Facility

Imperial College / /

IndustryTerm

adjacent routers / university network / regular Internet traffic / Internet infrastructure / on old networking protocols / neural networks / conventional networks / media attention / on-line tuning / destination-based identification algorithm / e-commerce websites / biological immune systems / random neural network / favourite news web-site / statistical pre-processor / Internet traffic / broadband Internet services / genetic algorithm / web-site / real-time identification / request web content / Internet downtime / conventional non-adaptive networks / agent software / Internet Protocol / e - commerce / detection algorithm / Web address / Internet service / firewall software / Internet crime / energy distribution / tree mining / detection systems / corporate networks / online / dedicated antivirus software / machine learning algorithms / energy distribution variation / data mining approach / large networking / victim server / e-commerce / egress router / network traffic burst detection algorithm / web service / active test solutions / autonomic networks / energy content / puzzle-based defence solutions / energy distribution variance / public network / identification algorithm / web servers / advertising idea / genetic algorithms / Upstream routers / overlay network / change point detection algorithm / antivirus software / fused using a random neural network / /

OperatingSystem

Microsoft Windows / DoS / /

Organization

U.S. government / Pakistani government / Internet Chess Club / Oxford University / Pentagon / White House / British Computer Society / National Aeronautics and Space Administration / /

Person

Georgios Loukas / Mayday / /

/

Position

Author / representative / network administrator / corporate executive / /

Product

1gb / sec / members / authors / /

ProgrammingLanguage

Microsoft SQL Server / /

ProvinceOrState

Ohio / Massachusetts / /

PublishedMedium

The New York Times / /

Technology

TCP protocol / statistical pre-processor / change point detection algorithm / operating system / Quality of Service / adjacent routers / DNS system / Neural Network / ISP / antivirus software / flash / filtering router / broadband / UDP protocol / destination-based identification algorithm / corresponding DoS detection algorithm / IP / clustering algorithm / genetic algorithm / UDP / operating systems / three machine learning algorithms / identification algorithm / network traffic burst detection algorithm / DNS / artificial intelligence / firewall / file sharing / HTTP / data mining / simulation / Voice-over-IP / VOIP / egress router / /

SocialTag