Denial-of-service attack

Results: 1246



#Item
101A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ †  SRI International

A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
102Bohatei: Flexible and Elastic DDoS Defense Seyed K. Fayaz∗ Yoshiaki Tobioka∗ Vyas Sekar∗ ∗ CMU † UIUC

Bohatei: Flexible and Elastic DDoS Defense Seyed K. Fayaz∗ Yoshiaki Tobioka∗ Vyas Sekar∗ ∗ CMU † UIUC

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 21:41:25
103AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† †  Vinod Yegneswaran‡

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
104Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
105 | www.dnsmadeeasy.com |   IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD

| www.dnsmadeeasy.com | IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD

Add to Reading List

Source URL: www.dnsmadeeasy.com

Language: English - Date: 2015-12-08 13:37:24
106Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University  Abstract. The insider threat remains one of th

Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University Abstract. The insider threat remains one of th

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
107AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† †  Vinod Yegneswaran‡

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: faculty.cse.tamu.edu

Language: English - Date: 2013-08-28 15:18:02
108In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, the motives f

In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, the motives f

Add to Reading List

Source URL: www.coyotus.com

Language: English - Date: 2015-05-07 14:41:02
    109IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† †  Rob Jansen‡

    IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2014-09-10 17:17:22
    110Botnets and Beyond Crimeware in the 21st Century Bill Hayes - CISSP Omaha World-Herald Company

    Botnets and Beyond Crimeware in the 21st Century Bill Hayes - CISSP Omaha World-Herald Company

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2008-05-16 20:02:08