Cyberwarfare

Results: 11990



#Item
631Computing / Internet protocols / Network architecture / Computer network security / Cyberwarfare / Transmission Control Protocol / HTTP cookie / Port / Network packet / Firewall / Network socket / Application layer

Protocol-Independent Adaptive Replay of Application Dialog Weidong Cui† , Vern Paxson‡ , Nicholas C. Weaver‡ , Randy H. Katz† † University of California, Berkeley, CA ‡ International Computer Science Institut

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:00
632Botnets / Computing / Computer network security / Multi-agent systems / Spamming / Malware / Cyberwarfare / Torpig / Srizbi botnet / Command and control / Festi / Fast flux

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

Add to Reading List

Source URL: seclab.cs.ucsb.edu

Language: English - Date: 2010-12-20 14:49:07
633Computer security / Cyberwarfare / Computing / Software bugs / Computer worms / Computer network security / Witty / Hacking / Software testing / Buffer overflow / Stack buffer overflow / SQL Slammer

reflections on witty by Nicholas Weaver Nicholas Weaver is a postdoctoral researcher at the

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
634Computer network security / Computing / Virtual private networks / Crypto-anarchism / Internet privacy / Network architecture / Cyberwarfare / Computer security

Microsoft Word - UTSI VPN Connection.docx

Add to Reading List

Source URL: cs.utsi.edu

Language: English - Date: 2013-10-03 17:02:20
635Security / Cyberwarfare / Computing / Computer network security / Computer security / Logistics / Supply chain management / E-commerce / EPCglobal Network / EPCIS / EPCglobal / Radio-frequency identification

Modeling in 12 Threat EPC-Based Information Sharing Networks Alexander Ilic, Trevor Burbridge, Andrea Soppera, Florian Michahelles, and Elgar Fleisch

Add to Reading List

Source URL: cocoa.ethz.ch

Language: English - Date: 2013-05-23 02:06:52
636Computing / Software / System software / Computer network security / Computer networking / Data security / Cyberwarfare / Wireless networking / Firewall / Transmission Control Protocol / Packet analyzer / Packet loss

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:08
637Antivirus software / Cybercrime / National security / McAfee / Software bugs / Intel Security / Computer security / Cyberwarfare / Heartbleed / Malware / Foundstone / Shellshock

Report McAfee Labs Threats Report August 2015

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-08-28 16:54:27
638Computing / Cyberwarfare / Computer network security / Computer networking / OpenFlow / Network architecture / Software-defined networking / Nox / Firewall / Computer network / Computer security / Denial-of-service attack

A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
639Security / Prevention / National security / Safety / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Information security / Privacy / Medical privacy

Thank you for the opportunuty to submit evidence to inform the Royal Society’s Cybersecurity research project. I am writing today on my own behalf to draw attention to an easily overlooked set of problems in cybersecu

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 12:06:03
640Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Command and control / Storm botnet / Cluster analysis / Internet bot / Hierarchical clustering

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2008-05-09 14:43:43
UPDATE