Spoofing attack

Results: 127



#Item
61Science / Artificial intelligence / Artificial intelligence applications / Computer network security / Assistive technology / Speech synthesis / Speech recognition / Speech Translation / Spoofing attack / Computational linguistics / Automatic identification and data capture / Human–computer interaction

Chapter 7 Speaker Recognition Anti-spoofing Nicholas Evans, Tomi Kinnunen, Junichi Yamagishi, Zhizheng Wu, Federico Alegre and Phillip De Leon

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2014-11-17 05:17:51
62Computer network security / Internet protocols / Internet standards / Transmission Control Protocol / IP address spoofing / Internet protocol suite / Netstat / File Transfer Protocol / Denial-of-service attack / Computing / Internet / Network architecture

Security Problems in the TCP/IP Protocol Suite S.M. Bellovin* [removed] AT&T Bell Laboratories Murray Hill, New Jersey[removed]ABSTRACT

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-05-18 18:40:15
63Denial-of-service attack / Botnet / LOIC / IP address spoofing / UDP flood attack / Denial-of-service attacks / Computer network security / Computing

Precise, Full-Scale, and Reliable Service Protection Huawei Next Generation Anti-DDoS Solution Highlights •• •• ••

Add to Reading List

Source URL: machoster.ru

Language: English - Date: 2015-02-06 04:33:44
64Computer security / Denial-of-service attack / Transmission Control Protocol / SYN flood / Spoofing attack / Firewall / Transport Layer Security / Man-in-the-middle attack / IP address spoofing / Computer network security / Cyberwarfare / Computing

EE122 Section 12 – Security Question 1 – Crackdown on P2P In 2007, a large broadband provider in the US disrupted end users’ BitTorrent connections with a layer-4 Denial-of-Service (DoS) attack. The provider identi

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2013-12-10 23:49:52
65Network architecture / IP address spoofing / Denial-of-service attack / Firewall / Traffic flow / Transport Layer Security / Transmission Control Protocol / Computer network security / Computing / Internet

Internet Engineering Task Force (IETF) Request for Comments: 6045 Category: Informational ISSN: [removed]K. Moriarty

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-11-08 00:37:32
66Internet protocols / Public-key cryptography / Internet standards / Key management / DNS spoofing / Domain Name System Security Extensions / Man-in-the-middle attack / Transport Layer Security / Cryptographic hash function / Cryptography / Internet / Domain name system

SEC[removed]E-MAIL SECURITY 805

Add to Reading List

Source URL: authors.phptr.com

Language: English - Date: 2002-08-15 11:31:28
67Computing / Computer security / Denial-of-service attack / Transmission Control Protocol / Robust random early detection / Ping / IP address spoofing / Computer network security / Denial-of-service attacks / Cyberwarfare

A Framework for Classifying Denial of Service Attacks∗ Alefiya Hussain John Heidemann Christos Papadopoulos USC/Information Sciences Institute {hussain,johnh,christos}@isi.edu ABSTRACT

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2003-07-24 11:26:28
68Computer security / Computing / Smurf attack / Denial-of-service attack / SYN flood / IP address spoofing / Ping / LAND / Stateful firewall / Denial-of-service attacks / Computer network security / Cyberwarfare

Configuring DMS Central Control Software to Communicate with VMS Signs Using the PortServer® TS H MEI Serial Server

Add to Reading List

Source URL: ftp1.digi.com

Language: English - Date: 2009-02-03 11:39:26
69Internet / Cyberwarfare / Denial-of-service attacks / Internet standards / Network address translation / IP address spoofing / Ping / Denial-of-service attack / IP address / Computing / Computer network security / Network architecture

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly Arthur Berger

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2009-11-23 23:36:37
70Network architecture / Denial-of-service attack / Ingress filtering / IP address spoofing / IP traceback / Router / Anycast / Firewall / Internet security / Computer network security / Computing / Cyberwarfare

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2005-03-11 09:41:56
UPDATE