Web traffic

Results: 920



#Item
81

How To Set up QoS in Gigabit Networks 1 Introduction The service we want to enforce is a minimum bandwidth guarantee to a class of traffic under port congestion and a drop probability profile. This is a layer-3 provision

Add to Reading List

Source URL: datatag.web.cern.ch

Language: English - Date: 2003-12-18 12:26:58
    82

    2015 Best Traffic Records Web page Questionnaire Again for 2015, ATSIP seeks to recognize exemplary work in the field of "Best Traffic Records Web Page". A wealth of information exists on the internet. This questionnaire

    Add to Reading List

    Source URL: www.trafficrecordsforum.org

    Language: English - Date: 2015-03-13 15:05:27
      83

      Want a gallery at The Pin-up Files? The Pin-up Files has been successfully promoting pin-up sinceWhether you are well established or relatively new to pin-up, you can share in our high web traffic and showcase you

      Add to Reading List

      Source URL: www.thepinupfiles.com

      Language: English - Date: 2015-06-23 16:57:49
        84Internet security / Internet Standards / Internet protocols / Secure communication / Dark web / IP hijacking / Tor / Border Gateway Protocol / Traffic analysis / Denial-of-service attack / Transmission Control Protocol

        RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

        Add to Reading List

        Source URL: vanbever.eu

        Language: English - Date: 2015-03-17 04:19:13
        85Cryptography / Dark web / Cross-platform software / David Chaum / Financial cryptography / Dining cryptographers problem / Anonymous remailer / Tor / Ciphertext / I2P / Anonymity / ElGamal encryption

        Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

        Add to Reading List

        Source URL: dedis.cs.yale.edu

        Language: English - Date: 2012-06-25 13:47:28
        86

        N1000 Network Security Appliance Detects threats within files in web, transfer and email traffic FEATURES Network File Extraction Extracts all files from HTTP, FTP, SMTP

        Add to Reading List

        Source URL: reversinglabs.com

        Language: English
          87

          FortiGate® Multi-Threat Security Firewall • VPN • Antivirus • Intrusion Prevention • Antispam • Web Filtering • Traffic Shaping MSSP AND LARGE ENTERPRISE SYSTEMS Product (Chassis) Firewall

          Add to Reading List

          Source URL: www.ic.co.uk

          Language: English - Date: 2011-06-24 06:25:26
            88Computing / Software engineering / Security / Data loss prevention software / Data security / Information technology / Hypertext Transfer Protocol / Computer security / JavaScript / World Wide Web / POST

            DATA LEAKS Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? David Gugelmann | ETH Zurich

            Add to Reading List

            Source URL: www.lenders.ch

            Language: English - Date: 2015-08-18 10:57:52
            89

            Preventing Side-Channel Leaks in Web Traffic: A Formal Approach Michael Backes Saarland University and MPI-SWS Goran Doychev

            Add to Reading List

            Source URL: software.imdea.org

            Language: English - Date: 2012-12-04 12:09:50
              90

              A Large-scale Study of Automated Web Search Traffic Greg Buehrer1, Jack Stokes2 and Kumar Chellapilla1 1Microsoft Live Labs, 2Microsoft Research Problem Statement

              Add to Reading List

              Source URL: airweb.cse.lehigh.edu

              Language: English - Date: 2008-05-12 09:34:39
                UPDATE