Computer network security

Results: 18127



#Item
921Denial-of-service attacks / Cyberwarfare / Computing / Domain name system / Denial-of-service attack / Internet Relay Chat / Computer security / Internet activism / Transmission Control Protocol / Computer network security / TCP reset attack / Domain Name System Security Extensions

JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-06-29 20:52:09
922Wireless networking / Cryptographic protocols / Computer access control / Computer network security / Authentication protocol / Mutual authentication / Digest access authentication / Extensible Authentication Protocol / Authentication / Man-in-the-middle attack

Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2015-04-08 16:31:41
923Computing / Network architecture / Computer architecture / Virtual private networks / Computer network security / Internet privacy / Crypto-anarchism / Quality of service / Differentiated services / SoftEther VPN / Mobile virtual private network

Microsoft Word - Dokument2

Add to Reading List

Source URL: www.kutter-fonds.ethz.ch

Language: English - Date: 2010-05-16 10:11:22
924Computing / Virtual private networks / Computer network security / Network architecture / Tunneling protocols / Layer 2 Tunneling Protocol / Point-to-Point Tunneling Protocol / SoftEther VPN / OpenVPN

ITServ Request for VPN Access Every field is mandatory Name: ______________________________________ ID. ___________ Tel. ___________ School/Department/Unit: _________________________Email: _____________________ Period Re

Add to Reading List

Source URL: itserv.ait.ac.th

Language: English - Date: 2012-10-23 04:58:00
925Government / Security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Forensic science / Prosecutor / Hotspot / Telecommunications (Interception and Access) Amendment (Data Retention) Act

State of the States Cyber Crime Consortium 2014 Meeting Recap

Add to Reading List

Source URL: www.search.org

Language: English
926Malware / Computer worms / Denial-of-service attacks / SQL Slammer / Warhol worm / Witty / Code Red / Transmission Control Protocol / Transport layer / Computer network security

The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:06
927Computing / Government / National security / Crime prevention / Security / Computer security / Computer network security / Privacy / Internet privacy / Motivation / Social media / Password

The Effect of Social Influence on Security Sensitivity

Add to Reading List

Source URL: www.usenix.org

Language: English
928Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / Openswan

LinuxTag 2010 Berlin strongSwan News Prof. Dr. Andreas Steffen Martin Willi

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 06:38:12
929Computing / Cyberwarfare / Security / Computer network security / Humancomputer interaction / Crime prevention / National security / Salvatore J. Stolfo / Usability / Masquerade / Rootkit / Computer security

Modeling User Search Behavior for Masquerade Detection Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University New York, USA

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
930Computing / Software engineering / Software architecture / Web 2.0 / Computer network security / Web development / Web programming / JavaScript / Cross-site scripting / Web framework / World Wide Web / Rich Internet application

Report from Dagstuhl SeminarWeb Application Security Edited by Lieven Desmet1 , Martin Johns2 , Benjamin Livshits3 , and

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2013-02-18 02:32:49
UPDATE