Computer network security

Results: 18127



#Item
951Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Command and control / Storm botnet / Cluster analysis / Internet bot / Hierarchical clustering

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2008-05-09 14:43:43
952Software / System software / Computing / Computer network security / Ipfirewall / Netfilter / PlanetLab / Network emulation / FreeBSD / QEMU / Operating-system-level virtualization / PF

Adding emulation to Planetlab nodes ∗ Paper ID: 137 – 12 pages

Add to Reading List

Source URL: info.iet.unipi.it

Language: English - Date: 2009-06-19 12:24:21
953Computing / Internet privacy / Proxy / Statistical analysis / Computer security / Computer networking / Proxy servers / Computer network security / Proxy list

Ares Faculty Guide: How to add a course proxy user If you have a teaching/graduate assistant, you can add them as a course proxy user to a specific course. Doing so grants them the privilege to add, edit and delete reser

Add to Reading List

Source URL: www.library.fordham.edu

Language: English - Date: 2015-10-27 14:58:18
954Computer network security / Emergency management / Computer security / Cryptography / National security / Emergency / Threat

Emergency Procedures Click here to choose site: In case of emergency − −

Add to Reading List

Source URL: www.pf.uq.edu.au

Language: English - Date: 2015-07-14 01:25:37
955Computing / Network performance / Scheduling algorithms / Computer networking / Computer network security / Denial-of-service attacks / Robust random early detection / Network scheduler / Fair queuing / Scheduling / Transmission Control Protocol / Schedule

Analysis of Fair Queueing schedulers in Real Systems Luigi Rizzo Universita‘ di Pisa Paolo Valente Universita‘ di Modena e Reggio Emilia

Add to Reading List

Source URL: info.iet.unipi.it

Language: English - Date: 2012-05-25 16:00:35
956Computing / Network architecture / Computer networking / Network protocols / Computer network security / Ethernet / Streaming / Middlebox / Multiprotocol Label Switching / Router / Network address translation / Forwarding plane

SoftCell: Scalable and Flexible Cellular Core Network Architecture Xin Jin† , Li Erran Li? , Laurent Vanbever† , and Jennifer Rexford† Princeton University† , Bell Labs? ABSTRACT

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2013-11-04 08:44:37
957Avionics / Computer network security / Computing / Security / Cyberwarfare / Air traffic control / Automatic dependent surveillance  broadcast / Intrusion detection system / Traffic collision avoidance system / Secondary surveillance radar / ADS / Computer security

Intrusion Detection for Airborne Communication using PHY-Layer Information Martin Strohmeier1 , Vincent Lenders2 , Ivan Martinovic1 1

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-08-08 10:32:39
958Computer network security / Global Information Assurance Certification / SANS Institute / Computer security / Intrusion detection system

The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-08-20 16:00:38
959Computing / Internet / Network architecture / Computer network security / Computer networking / Transmission Control Protocol / Border Gateway Protocol / Router / Internet protocol suite / Packet loss / Firewall / Communications protocol

Application-Driven TCP Recovery and Non-Stop BGP Robert Surton, Ken Birman, and Robbert van Renesse Department of Computer Science, Cornell University Abstract—Some network protocols tie application state to underlying

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-04-22 08:52:17
UPDATE