Denial-of-service attack

Results: 1246



#Item
201Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
202Computer security / Cyberwarfare / Malware / Denial-of-service attack / Computer virus / Firewall / Spyware / Avira / Targeted threat / System software / Computer network security / Antivirus software

PA L O A LT O N E T W O R K S : C o n t e n t - I D Te c h n o l o g y B r i e f Content-ID Content-ID enables customers DATA

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2012-05-03 22:07:17
203SMS / Marketing / Short message service center / Network congestion / Denial-of-service attack / Voice-mail / Control channel / Spam / RoS / Technology / Mobile technology / Text messaging

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta Systems and Internet Infrastructure Security Laboratory Networking and Securi

Add to Reading List

Source URL: www.enck.org

Language: English
204Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Computer worms / Network telescope / Stefan Savage / Firewall / Internet security / Computer network security / Denial-of-service attacks / Cyberwarfare

National Science Foundation Trusted Computing (TC) Solicitation NSFQuantitative Network Security Analysis David Moore, Geoffrey M. Voelker and Stefan Savage

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:48:34
205Network architecture / Network performance / Cryptographic software / Tor / Onion routing / Network congestion / Proxy server / Denial-of-service attack / Transmission Control Protocol / Internet privacy / Computing / Internet

A Practical Congestion Attack on Tor Using Long Paths Nathan S. Evans Colorado Research Institute for Security and Privacy University of Denver Email:

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2009-06-11 20:30:09
206Distributed data storage / Cryptographic hash function / Wireless sensor network / Denial-of-service attack / Man-in-the-middle attack / Onion routing / Cryptography / Public-key cryptography / Message authentication code

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
207Networking hardware / Forwarding plane / Computer networking / Input queue / Scheduling / Router / Packet Processing / Latency / Denial-of-service attack / Computing / Computer architecture / Scheduling algorithms

Improved Forwarding Architecture and Resource Management for Multi-Core Software Routers Norbert Egi∗ , Adam Greenhalgh‡ , Mark Handley‡ , Gianluca Iannaccone† , Maziar Manesh† , Laurent Mathy∗ , Sylvia Ratna

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2009-09-15 16:01:35
208Wireless sensor network / Computing / Security / Network topology / Secure communication / Mesh networking / ANT / Denial-of-service attack / Computer security / Computer network security / Wireless networking / Technology

Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos and Tassos Dimitriou Athens Information Technology Algorithms & Security

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
209Network architecture / Network protocols / Network performance / Internet Relay Chat / SOCKS / Session / Transmission Control Protocol / Proxy server / Denial-of-service attack / Computing / Internet / Internet privacy

Inferno Nettverk A/S Technical Report Analysis of the session limit functionality in Dante versionAugust 6, 2012

Add to Reading List

Source URL: www.inet.no

Language: English - Date: 2012-08-06 06:59:49
210Internet Relay Chat / Cyberwarfare / Videotelephony / Ident / Distributed firewall / Firewall / Skype / Denial-of-service attack / Secure Shell / Software / Computing / Computer network security

Delegating Network Security with More Information Jad Naous Ryan Stutsman Stanford University

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2012-10-04 00:45:33
UPDATE