Computer Security Institute

Results: 1676



#Item
271Computer network security / Data transmission / Transmission Control Protocol / Transport layer / Computer networking / Packet loss / Network address translation / Firewall / Traffic flow / Computing / Data / Information

Robust TCP Stream Reassembly In the Presence of Adversaries Sarang Dharmapurikar Vern Paxson Washington University in Saint Louis International Computer Science Institute, Berkeley

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:49:52
272Security / Intrusion detection system / Anomaly detection / Vulnerability / Attack / Rootkit / Threat / Multics / Snort / Computer security / Computer network security / Cyberwarfare

IJIS: 14–35 / Digital Object Identifier (DOIs102070100001 Intrusion and intrusion detection John McHugh CERT Coordination Center∗ , Software Engineering Institute, Carnegie Mellon University,

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:40:14
273Welchia / Morris worm / Blaster / Witty / SQL Slammer / Stration / Server Message Block / Computer virus / Computer security / System software / Computer worms / Software

A Worst-Case Worm ∗ Nicholas Weaver International Computer Science Institute Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-06-08 10:49:32
274System software / Berkeley Packet Filter / Firewall / Packet capture / Netfilter / Packet switching / Filter / Transmission Control Protocol / Packet Processing / Computing / Computer network security / Network architecture

Enhancing Network Intrusion Detection With Integrated Sampling and Filtering Jose M. Gonzalez and Vern Paxson International Computer Science Institute Berkeley, California, USA , / ve

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-07-08 02:15:00
275Cross-platform software / Scripting languages / Relational database management systems / Database management systems / Software testing / Vulnerability / Cross-site scripting / SQL injection / Code injection / Computing / Software engineering / Computer programming

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-08-18 12:06:49
276Peer-to-peer / Bloom filter / Cyberwarfare / Cryptographic hash function / Detective / Denial-of-service attack / ANts P2P / Computer security / Hashing / File sharing networks / Computing

Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman† , Ethan Blanton‡ , Vern Paxson† , Scott Shenker† Computer Science Institute, ‡ Purdue University † International

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-11-16 13:20:37
277Internet / Computer security / Malware / IP traceback / National Institute of Information and Communications Technology / Threat / International Cybercrime / Computer network security / Security / Cyberwarfare

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2011-03-02 01:35:34
278Cyberwarfare / Computer security / Crime prevention / National security / Intrusion detection system / Network security / Telecommunications data retention / Threat / Surveillance / Computer network security / Security / Computing

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-07-14 15:42:26
279Computing / Computer law / Federal Information Security Management Act / Information technology management / National Institute of Standards and Technology / Information security / Performance measurement / Security controls / Security management / Computer security / Data security / Security

NIST SPRevision 1, Performance Measurement Guide for Information Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 14:52:35
280Cryptographic protocols / Secure communication / Internet protocols / Internet standards / Network performance / Transport Layer Security / Stunnel / HTTP Secure / Cipher suite / Computing / Internet / Network architecture

SSL splitting: securely serving data from untrusted caches Chris Lesniewski-Laas and M. Frans Kaashoek {ctl,kaashoek}@mit.edu Laboratory for Computer Science Massachusetts Institute of Technology Abstract

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:16
UPDATE