Deep content inspection

Results: 82



#Item
1Telecom Regulatory Authority of India  Pre- Consultation Paper on Net Neutrality

Telecom Regulatory Authority of India Pre- Consultation Paper on Net Neutrality

Add to Reading List

Source URL: trai.gov.in

Language: English - Date: 2016-05-30 03:39:24
2Proceedings on Privacy Enhancing Technologies ; ):37–61  Sheharbano Khattak*, Tariq Elahi*, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg  SoK: Making Sense of Censorship Resistance Syst

Proceedings on Privacy Enhancing Technologies ; ):37–61 Sheharbano Khattak*, Tariq Elahi*, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg SoK: Making Sense of Censorship Resistance Syst

Add to Reading List

Source URL: sec.cs.ucl.ac.uk

Language: English - Date: 2016-07-19 04:21:03
3DPI Technology from the standpoint of Internet governance studies: An introduction Dr. Milton Mueller, Syracuse University School of Information Studies What is DPI? A study of whether and how DPI technology disrupts Int

DPI Technology from the standpoint of Internet governance studies: An introduction Dr. Milton Mueller, Syracuse University School of Information Studies What is DPI? A study of whether and how DPI technology disrupts Int

Add to Reading List

Source URL: dpi.ischool.syr.edu

Language: English - Date: 2011-11-28 11:52:02
4Microsoft Word - Filtering.briefing.doc

Microsoft Word - Filtering.briefing.doc

Add to Reading List

Source URL: www.iptegrity.com

Language: English - Date: 2011-08-21 08:05:13
5Censorship Arms Race: Research vs. Practice Sadia Afroz1 , David Fifield1 , Michael C. Tschantz2 , Vern Paxson1,2 , J. D. Tygar1 1 2

Censorship Arms Race: Research vs. Practice Sadia Afroz1 , David Fifield1 , Michael C. Tschantz2 , Vern Paxson1,2 , J. D. Tygar1 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-07-07 21:36:37
6Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
7Application Datasheet  Mobile Data Offloading Use Case Application awareness to enable data delivery with network technologies complementary to 3G/4G such as WiFi networks or femtocells.

Application Datasheet Mobile Data Offloading Use Case Application awareness to enable data delivery with network technologies complementary to 3G/4G such as WiFi networks or femtocells.

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:07:49
8Microsoft PowerPoint - security notes 3-6

Microsoft PowerPoint - security notes 3-6

Add to Reading List

Source URL: signalhill.in

Language: English - Date: 2013-09-25 15:28:43
9ADAPT IN REAL TIME WITH ADVANCED SERVICE CLASSIFICATION FROM LEADERS QOSMOS AND NAPATECH Qosmos, the leader in Deep Packet Inspection (DPI) and metadata analysis software, and Napatech, the world’s largest vendor of ac

ADAPT IN REAL TIME WITH ADVANCED SERVICE CLASSIFICATION FROM LEADERS QOSMOS AND NAPATECH Qosmos, the leader in Deep Packet Inspection (DPI) and metadata analysis software, and Napatech, the world’s largest vendor of ac

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:08:25
10Cisco Content Services Switch Getting Started Guide Software Version 7.50 MarchCorporate Headquarters

Cisco Content Services Switch Getting Started Guide Software Version 7.50 MarchCorporate Headquarters

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:20:32