Deep packet capture

Results: 63



#Item
51Computing / Computer networking / Telecommunications engineering / Computer network security / Deep packet inspection / Kratos Defense & Security Solutions / Jitter / Electronics

Data Overload Insider Threat Disadvantaged Locations Capture

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2013-12-04 16:32:44
52Data / Deep packet inspection / Packet capture / Firewall / Packet switching / Network packet / Router / Quality of service / Transmission Control Protocol / Computing / Computer network security / Network architecture

Working Paper Deep Packet Inspection in Perspective: Tracing its lineage and surveillance potentials by Christopher Parsons*

Add to Reading List

Source URL: www.sscqueens.org

Language: English - Date: 2011-08-17 15:43:16
53Network architecture / Computer network security / Wireless networking / Deep packet capture / Packet capture / Virtual LAN / Packet analyzer / Pcap / Voice over IP / Software / Computing / Ethernet

field hand held stream to disk appliance Lawful interception, Police capture, Forensic analysis GbE IP filtering hardware firmware wirespeed field hand held tap active aggregation tap GbE IP filtering hardware firmware w

Add to Reading List

Source URL: www.albedotelecom.com

Language: English - Date: 2013-10-02 12:22:13
54Cyberwarfare / Deep packet capture / Computer networking / Networking hardware / Firewall / Packet capture / Packet Processing / Pcap / Denial-of-service attack / Computing / Computer network security / Software

Towards Monitoring Programmability in Future Internet: challenges and solutions Francesco Fusco, Luca Deri and Joseph Gasparakis Abstract Internet is becoming a global IT infrastructure serving interactive and real-time

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2010-09-04 01:40:42
55Networking hardware / Computer networking / Scheduling algorithms / Packet Processing / Scheduling / Packet loss / New API / Multi-core processor / Thread / Computing / Computer network security / Deep packet capture

High Speed Network Traffic Analysis with Commodity Multi-core Systems Francesco Fusco IBM Research - Zurich ETH Zurich [removed]

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2010-09-04 01:40:52
56Computer security / Deep packet inspection / Firewall / Packet Processing / Transmission Control Protocol / Deep content inspection / Packet capture / Computer network security / Computing / Cyberwarfare

Network Monitoring for Security Checking Wissam Mallouli – Montimage RCIS industrial day – May 31st[removed]removed]

Add to Reading List

Source URL: www.mallouli.com

Language: English - Date: 2014-01-25 19:05:37
57Computer network security / Wireless networking / Information technology management / Computer networking / Deep packet capture / Packet capture / Capsa / Packet analyzer / Network performance management / Computing / Network management / Network architecture

Datasheet Datasheet (nChronos[removed]Copyright © 2013 Colasoft LLC. All rights reserved.

Add to Reading List

Source URL: www.colasoft.com

Language: English - Date: 2013-06-21 05:53:03
58Network architecture / Computer network security / Wireless networking / Deep packet capture / Packet capture / Virtual LAN / Packet analyzer / Pcap / Voice over IP / Software / Computing / Ethernet

field hand held stream to disk appliance Lawful interception, Police capture, Forensic analysis GbE IP filtering hardware firmware wirespeed field hand held tap active aggregation tap GbE IP filtering hardware firmware w

Add to Reading List

Source URL: www.telecom.albedo.biz

Language: English - Date: 2013-10-02 12:22:13
59Computing / Electronic engineering / Technology / Vocus / Videotelephony / Cisco Systems / Deep packet inspection

Vyopta will be attending InfoComm 2012 Vyopta will be a guest in the Cisco booth to demonstrate how Vyopta products compliment Cisco’s Capture Transform Share solution. Austin, TX (PRWEB) June 07, [removed]Vyopta Incorp

Add to Reading List

Source URL: www.vyopta.com

Language: English - Date: 2013-12-16 04:02:48
60Cyberwarfare / Computer networking / Deep packet capture / Packet capture / Denial-of-service attack / Cache / Router / Packet switching / Transmission Control Protocol / Computing / Computer network security / Network architecture

CMU-ITC[removed]IPwatch: A Tool for Monitoring

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-01-03 15:36:31
UPDATE