Denial of Peter

Results: 32



#Item
21Computing / Vulnerability / Denial-of-service attack / Attack / Penetration test / Buffer overflow / Exploit / JavaScript / Zero-day attack / Computer network security / Cyberwarfare / Computer security

Understanding the World of your Enemy with I-CAT (Internet- Categorization of Attacks Toolkit) Peter Mell NIST, Computer Security Division[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
22Security / AAFID / Hacking / Intrusion detection system / Denial-of-service attack / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
23Computer security / Denial-of-service attack / Intrusion detection system / Malware / Internet security / AAFID / Exploit / Private network / Firewall / Computer network security / Cyberwarfare / Computing

A Denial of Service Resistant Intrusion Detection Architecture Peter Mell, Donald Marks, Mark McLarnon National Institute of Standards and Technology Computer Security Division[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
24Software testing / Computer network security / Statistics / Data security / Intrusion detection system / Anomaly detection / Denial-of-service attack / Attack patterns / Vulnerability / Computer security / Hacking / Cyberwarfare

On Widening the Scope of Attack Recognition Languages Jon Doyle, Howard Shrobe, and Peter Szolovits Massachusetts Institute of Technology Cambridge, MA[removed]May 30, 2000

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-01-16 16:05:44
25Data mining / Intrusion detection system / Anomaly / Recall / Denial-of-service attack / Mind / Computing / Information technology management / Computer network security / Data security / Anomaly detection

SECOND IEEE-SMC INFORMATION ASSURANCE WORKSHOP, WEST POINT, NEW YORK, JUNE 5-6, [removed]Event Recognition Beyond Signature and Anomaly Jon Doyle, Isaac Kohane, William Long, Howard Shrobe, and Peter Szolovits

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-03-23 12:19:38
26Videotelephony / Network performance / Ethernet / Cisco Systems / Deep packet inspection / Internet access / Long Reach Ethernet / Cisco WAAS / Denial-of-service attack / Computing / Electronics / WAN optimization

Cisco and Akamai join forces to supercharge the branch office Analyst: Peter Christy 29 Apr, 2014 Cisco and Akamai have announced a joint offering based on the Cisco ISR-AX branch router with

Add to Reading List

Source URL: www.cisco.com

Language: English
27Appeal / British society / Law / Lawsuit / Volcker Commission

CLAIMS RESOLUTION TRIBUNAL In re Holocaust Victim Assets Litigation Case No. CV96-4849 Certified Denial to Claimant Peter Leighton-Langer in re Account of Paul Langer

Add to Reading List

Source URL: www.crt-ii.org

Language: English - Date: 2007-05-16 10:58:44
28The Holocaust Industry / Raul Hilberg / United States Holocaust Memorial Museum / Bibliography of The Holocaust / Final Solution / Night / Elie Wiesel / Responsibility for the Holocaust / Holocaust denial / The Holocaust / Historiography / Antisemitism

Holocaust Studies Reflections and Predictions Peter Hayes JOSEPH AND REBECCA MEYERHOFF ANNUAL LECTURE NOVEMBER 15, 2013

Add to Reading List

Source URL: www.ushmm.org

Language: English - Date: 2014-02-03 14:20:20
29Crimes / International criminal law / Murder / Population / Samuel Totten / Center for the Study of Genocide /  Conflict Resolution /  and Human Rights / Genocide denial / Genocide / Criminal law / International relations

The Institute for Global Studies Presents: Genocide and its Aftermaths Valentina’s Nightmare (Detail Hands) by Peter Driessen, 1997

Add to Reading List

Source URL: hrp.cla.umn.edu

Language: English - Date: 2014-03-31 11:57:19
30Denial-of-service attack / Cyberspace / Internet security / SYN flood / Stefan Savage / Denial-of-service attacks / Computer network security / Computing

A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms Jelena Mirkovic, Janice Martin and Peter Reiher Computer Science Department University of California, Los Angeles Technical report #020018

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2002-05-01 03:16:24
UPDATE