Spoofing

Results: 545



#Item
51Internet / Domain name system / Computing / Network architecture / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Name server / Time to live

./by-Rlt--prod-all-zn-lt-ttl.eps

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2009-12-09 11:21:49
52

True lies in big data: Detecting location spoofing based on geographic knowledge Bo Zhao* and Daniel Z. Sui Department of Geography The Ohio State University Columbus, OH, 43210

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
    53

    Reactions and Responses 1 IP Spoofing Stimuli • Why would an attacker spoof his source

    Add to Reading List

    Source URL: galaxy.cs.lamar.edu

    Language: English - Date: 2009-11-10 11:36:00
      54SMS / Text messaging / Short message service center / Short code / Multimedia Messaging Service / Mobile ticketing / SMS spoofing / Technology / Mobile technology / Wireless

      SMS Notify! API Frequently Asked Questions Contents GENERAL QUESTIONS ................................................................................................................................... 2 What is SMS Noti

      Add to Reading List

      Source URL: www.cdyne.com

      Language: English - Date: 2015-07-16 12:07:17
      55Kad network / Karlsruhe Institute of Technology / Karlsruhe / Tor / Software / Hsinchu / IP address spoofing / System software / Distributed data storage / Kademlia / Computing

      S/Kademlia: A Practicable Approach Towards Secure Key-Based Routing

      Add to Reading List

      Source URL: doc.tm.uka.de

      Language: English - Date: 2008-03-25 10:39:00
      56Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / DNS root zone / DNS spoofing / Domain name system / Internet / Internet protocols

      Master Research Project Measuring the deployment of DNSSEC over the Internet Nicolas Canceill

      Add to Reading List

      Source URL: www.nlnetlabs.nl

      Language: English - Date: 2015-05-30 08:14:06
      57Surveillance / Security / Biometrics / Computer network security / Gait analysis / Orthopedic surgery / Spoofing attack / Gait / Facial recognition system / Locomotion / Medicine / Motion

      Can Gait Biometrics be Spoofed?∗ A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietik¨ainen Center for Machine Vision Research, University of Oulu, Finland J. Bustard & M. Nixon School of Electronics and Computer Science

      Add to Reading List

      Source URL: www.ee.oulu.fi

      Language: English - Date: 2012-04-06 05:12:29
      58Network architecture / Domain Name System Security Extensions / DNS spoofing / Name server / Root name server / Extension mechanisms for DNS / Denial-of-service attack / Anycast / Load balancing / Internet / Computing / Domain name system

      Fragmentation Considered Poisonous arXiv:1205.4011v1 [cs.CR] 17 May 2012 Amir Herzberg† and Haya Shulman‡ Dept. of Computer Science, Bar Ilan University

      Add to Reading List

      Source URL: arxiv.org

      Language: English - Date: 2012-05-23 11:56:51
      59

      Crescendo com Qualidade • Aperfeiçoando Bridges • Evitando ARP spoofing • Alta disponibilidade com VRRP Leonardo C. Rosa – MUM – 2008, São Paulo/Brasil

      Add to Reading List

      Source URL: www.bdibbs.com.br

      Language: Portuguese - Date: 2009-02-24 21:49:40
        60Text messaging / Online chat / SMS / Mobile marketing / Mobile phone spam / SMS spoofing / Technology / Mobile technology / Wireless

        “Our response rate with SMS is 35% compared to traditional channels.. and thanks to Web SMS we are saving up to 70% on costs for printing and mailing letters” Challenge presented Confartigianato

        Add to Reading List

        Source URL: static.skebby.it

        Language: English - Date: 2013-01-17 09:31:40
        UPDATE