Denial-of-service attack

Results: 1246



#Item
91Global Mapping of Cyber Attacks  Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

Add to Reading List

Source URL: www.casos.cs.cmu.edu

Language: English
92Website Fingerprinting Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier Dominik Herrmann, Hannes Federrath University of Regensburg, Germany

Website Fingerprinting Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier Dominik Herrmann, Hannes Federrath University of Regensburg, Germany

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:33:02
93Revisiting Countermeasures Against NDN Interest Flooding Samir Al-Sheikh Matthias Wählisch

Revisiting Countermeasures Against NDN Interest Flooding Samir Al-Sheikh Matthias Wählisch

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:27:13
94Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 18:31:26
95Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† †  University of Michigan, Ann Arb

Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† † University of Michigan, Ann Arb

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-01-16 19:16:47
96Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:55
97JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-06-29 20:52:09
98RAPTOR: Routing Attacks on Privacy in Tor  arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2015-03-17 04:19:13
99Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

Add to Reading List

Source URL: icir.org

Language: English - Date: 2015-04-22 12:30:04
100An Analysis of China’s “Great Cannon” Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi UC Berkeley, Citizen Lab

An Analysis of China’s “Great Cannon” Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi UC Berkeley, Citizen Lab

Add to Reading List

Source URL: www.usenix.org

Language: English