Denial-of-service attack

Results: 1246



#Item
191Domain name system / Internet protocols / Akamai Technologies / Content delivery network / Computer network security / Anycast / Domain Name System Security Extensions / Denial-of-service attack / Domain name / Internet / Network architecture / Computing

AKAMAI WEB PERFORMANCE SOLUTIONS: PRODUCT BRIEF Fast DNS DNS resolution that is fast, reliable and secure

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 14:04:01
192Network performance / ARPANET / Networking hardware / Pluribus / Content delivery network / Network switch / Denial-of-service attack / Ethernet / Traffic shaping / Computing / Concurrent computing / Distributed computing

Pluribus_Logo_transparent_CMYK

Add to Reading List

Source URL: www.pluribusnetworks.com

Language: English - Date: 2014-12-03 06:37:57
193Network architecture / Cyberwarfare / Transmission Control Protocol / Internet protocols / Internet protocol suite / Port / Denial-of-service attack / Internet Protocol / LAND / Computer network security / Computing / Denial-of-service attacks

Microsoft PowerPoint - 25C3TCPVulnerabilities_release.ppt

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2009-01-12 07:50:45
194Computing / Hacking / Spamming / Electronic commerce / Secure communication / Denial-of-service attack / Zero-day attack / Vulnerability / Attack / Computer network security / Cyberwarfare / Computer security

Infrastructure Security 1. Infrastructure Security The PlugX RAT Used in Targeted Attacks In this report, we discuss the PlugX RAT used in targeted attacks, and look at examples of

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:06
195Streaming / Computer network security / Internet protocols / Data transmission / Denial-of-service attacks / Transmission Control Protocol / Packet loss / Real-time Transport Protocol / Denial-of-service attack / Data / Computing / Information

DoS Protection for Reliably Authenticated Broadcast Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, and Santosh Venkatesh University of Pennsylvania Abstract Authenticating broadcast packet communications

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:43
196Computing / Denial-of-service attack / Smart grid / Computer security / Computer network security / Cyberwarfare / Security

Networks and Systems security group 2011 Wolfgang John Erland Jonsson Philippas Tsigas Tomas Olovsson Marina Papatriantafilou Magnus Almgren Asrin Javaheri

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:23:28
197Computing / DNS spoofing / Name server / Domain Name System Security Extensions / Root name server / Denial-of-service attack / Google Public DNS / Anycast / DNS hijacking / Domain name system / Internet / Network architecture

Internet Operation 2. Internet Operation DNS Open Resolver Issues There has been a spate of incidents in which recursive DNS servers without appropriate access

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:18
198Peer-to-peer / Query flooding / Freenet / Gnutella / Concurrent computing / Denial-of-service attack / Social peer-to-peer processes / Reputation / File sharing networks / Computing / Software

Accountability and Resource Management A discussion of issues for peer-to-peer systems Roger Dingledine Reputation Technologies

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2007-02-09 23:47:57
199Cyberwarfare / Intrusion detection system / Anomaly detection / Computing / Battery charger / Denial-of-service attack / Security / Computer network security / Data security / Computer security

Battery-Sensing Intrusion Protection for Wireless Handheld Computers using a Dynamic Threshold Calculation Algorithm for Attack Detection

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2006-12-19 22:22:36
200Tapestry / Peer-to-peer / Pastry / Overlay network / Multicast / Denial-of-service attack / Chord / Message Passing Interface / Event / Computing / Distributed data storage / Concurrent computing

A Pretty Flexible API for Generic Peer-to-Peer Programming Giuseppe Ciaccio DISI, Universit`a di Genova via DodecanesoGenova, Italy

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2005-05-18 06:04:04
UPDATE