Denial-of-service attack

Results: 1246



#Item
91Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

Add to Reading List

Source URL: www.casos.cs.cmu.edu

Language: English
92Fingerprinting algorithms / Cyberwarfare / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Fingerprint / Internet privacy / Security / Surveillance / Access control

Website Fingerprinting Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier Dominik Herrmann, Hannes Federrath University of Regensburg, Germany

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:33:02
93Cyberwarfare / Computer network security / Denial-of-service attacks / Computer networking / Named data networking / Interest Flooding Attack / Denial-of-service attack / Forwarding plane / Computer network / Computer security

Revisiting Countermeasures Against NDN Interest Flooding Samir Al-Sheikh Matthias Wählisch

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:27:13
94Computing / Internet / Cryptography / Cybercrime / Internet Standards / Internet protocols / Cyberwarfare / National security / Denial-of-service attack / Computer security / Border Gateway Protocol / DNS spoofing

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 18:31:26
95Secure communication / Security / Cyberwarfare / Computing / Electronic voting in Estonia / Electronic voting / Computer network security / Cryptographic protocols / Denial-of-service attack / Voting system / Server / Absentee ballot

Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† † University of Michigan, Ann Arb

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-01-16 19:16:47
96Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:55
97Denial-of-service attacks / Cyberwarfare / Computing / Domain name system / Denial-of-service attack / Internet Relay Chat / Computer security / Internet activism / Transmission Control Protocol / Computer network security / TCP reset attack / Domain Name System Security Extensions

JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-06-29 20:52:09
98Internet security / Internet Standards / Internet protocols / Secure communication / Dark web / IP hijacking / Tor / Border Gateway Protocol / Traffic analysis / Denial-of-service attack / Transmission Control Protocol

RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2015-03-17 04:19:13
99Network performance / Computing / Network management / Internet security / System software / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol

Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

Add to Reading List

Source URL: icir.org

Language: English - Date: 2015-04-22 12:30:04
100Cyberwarfare / Internet censorship in China / Computing / Denial-of-service attacks / Internet activism / Human rights in China / Internet in China / Cyberspace / GreatFire / Baidu / Denial-of-service attack / GFW

An Analysis of China’s “Great Cannon” Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi UC Berkeley, Citizen Lab

Add to Reading List

Source URL: www.usenix.org

Language: English
UPDATE