Transmission security

Results: 1396



#Item
101Transmission Control Protocol / Network packet / Voice over IP / Computing / Information

Multi-Class Traffic Morphing for Encrypted VoIP Communication W. Brad Moore, Henry Tan, Micah Sherr, and Marcus A. Maloof Georgetown University {wbm,ztan,msherr,maloof}@cs.georgetown.edu

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2015-01-11 00:33:46
102Network performance / Computing / Computer architecture / Software / Network socket / Network congestion / TCP congestion control / Transmission Control Protocol / Tor / Packet loss / Linux kernel / Scheduling

PDF Document

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2014-10-09 10:44:05
103Software / System software / Computing / Computer network security / Hacking / Wireless networking / Port scanner / Nmap / Transmission Control Protocol / Data security / Idle scan / SYN cookies

PDF Document

Add to Reading List

Source URL: zmap.io

Language: English - Date: 2014-12-10 12:42:37
104Cryptography / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Wireless / Secure communication / Man-in-the-middle attack / Bluetooth / Key-agreement protocol / HTTPS / Password / Transmission Control Protocol

PDF Document

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
105TCP/IP / Electronic commerce / Key management / Tcpcrypt / Transmission Control Protocol / Public key certificate / Transport Layer Security / Cryptography / Public-key cryptography / Cryptographic protocols

Introduction tcpcrypt Performance Conclusion 1/25

Add to Reading List

Source URL: www.tcpcrypt.org

Language: English - Date: 2010-08-13 12:07:58
106Electric power distribution / Electromagnetism / Emerging technologies / Smart grid / Cyberwarfare / Electrical grid / Cyber security standards / Smart meter / Computer security / Technology / Energy / Electric power transmission systems

PDF Document

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:12
107Cyberwarfare / Computer security / SYN flood / Data security / Denial-of-service attack / Transmission Control Protocol / Ping / Firewall / Flooding / Computer network security / Denial-of-service attacks / Computing

Network Intrusion Detection of Third Party Effects by Richard Bejtlich, TaoSecurity www.bejtlich.net v1.01, 05 September 2000

Add to Reading List

Source URL: www.taosecurity.com

Language: English - Date: 2004-11-14 11:10:18
108Router / Server appliance / Security Target / 3Com / Hewlett-Packard / Open Shortest Path First / Computer network / Transmission Control Protocol / Computing / Computer hardware / Networking hardware

HP Routers EAL2 Security Target Version: 1.07 Aug. 20, 2010 Prepared by: Hewlett-Packard Development Company, L.P.

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-04 05:06:56
109IP address / Transmission Control Protocol / Computing / Cyberwarfare / Application firewall / Computer security / Attack patterns

Poster: An Automatic Multi-Step Attack Pattern Mining Approach for Massive WAF Alert Data Yang Zhang1,2 , Tingwen Liu1,2 , Jinqiao Shi1,2 , Panpan Zhang1,2 , Haoliang Zhang1,2 , Jing Ya1,2 1 Institute of Information Eng

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:24
110

Redcare Surveillance Transmission Options Supporting your journey to IP-based surveillance At the heart of surveillance across the UK BT Redcare Surveillance works behind the scenes to underpin public safety and security

Add to Reading List

Source URL: www.redcare.bt.com

Language: English - Date: 2015-06-04 11:51:53
    UPDATE