Deep packet inspection

Results: 1581



#Item
321Telecommunications engineering / Computing / Wi-Fi / Deep packet inspection / Wireless Nodes Database / Wireless network / Cracking of wireless networks / Wireless networking / Computer network security / Technology

AirLift WiFi Monitoring System AirLift WiFi Monitoring System  Survey for WiFi Channels in use

Add to Reading List

Source URL: www.rincon.com

Language: English - Date: 2014-10-23 09:53:02
322Videotelephony / Cisco Systems / Deep packet inspection / Hewlett-Packard / Computing / Technology / Computer hardware

Microsoft PowerPoint - Needham IR Deck[removed]pptx

Add to Reading List

Source URL: hd.egain.com

Language: English - Date: 2014-08-05 09:31:31
323Videotelephony / Internet broadcasting / Digital television / Internet television / Deep packet inspection / Service delivery platform / Overlay network / IPTV / Cisco Systems / Computing / Electronics / Electronic engineering

Microsoft PowerPoint - [APII Workshop] Overlay Content Routing Test[removed]Draft

Add to Reading List

Source URL: www.jgn.nict.go.jp

Language: English - Date: 2015-03-31 02:53:34
324Computer security / Middlebox / Snort / Deep packet inspection / ANts P2P / Intrusion detection system / HTTP Secure / Computer network security / Computing / Software

BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 09:24:18
325Network architecture / Firewall / Network switch / Load balancing / Distributed firewall / Virtual LAN / Deep packet inspection / Computer network security / Computing / Middlebox

A Policy-aware Switching Layer for Data Centers Dilip A. Joseph [removed] Arsalan Tavakoli [removed]

Add to Reading List

Source URL: ccr.sigcomm.org

Language: English - Date: 2008-07-23 12:32:55
326System software / Firewall / Stateful firewall / Distributed firewall / Common Address Redundancy Protocol / Replication / Deep packet inspection / Netfilter / Check Point VPN-1 / Computer network security / Computing / Computer security

Demystifying cluster-based fault-tolerant Firewalls P. Neira, R.M. Gasca L. Lef`evre

Add to Reading List

Source URL: 1984.lsi.us.es

Language: English - Date: 2010-01-12 07:22:00
327Internet standards / Loopback / Computer network security / IPv4 / IPv6 / Voice over IP / Transmission Control Protocol / Deep packet inspection / Network address translation / Network architecture / Internet / Computing

Brochure_Fiber_Small_B.pdf

Add to Reading List

Source URL: www.psiber.com

Language: English - Date: 2011-03-30 13:12:08
328Internet protocols / Network protocols / Internet standards / Cisco Systems / Deep packet inspection / Videotelephony / IP multicast / Multicast / OpenFlow / Internet / Computing / Network architecture

SDN Multicasting on KOREN/TEIN/APII Sunyoung Han Konkuk University, Seoul, Korea

Add to Reading List

Source URL: www.jgn.nict.go.jp

Language: English - Date: 2015-03-31 02:56:34
329Technology / Content-control software / Deep packet inspection / Safenet / FireEye /  Inc. / Fortinet / Qualys / Juniper Networks / RSA / Computing / Computer security / Computer network security

RSAC15_North_Hall_2-23-15

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-03-15 16:54:17
330Computer networking / Check Point / Computer network security / Deep packet inspection / Hyper-V / Hypervisor / Virtual appliance / VMware / Virtual firewall / System software / Software / Virtual machines

Check Point Datasheet PRODUCT DESCRIPTION The Check Point Security Gateway Virtual Edition (VE) protects dynamic virtualized environments

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2014-09-08 11:01:43
UPDATE