Denial-of-service attack

Results: 1246



#Item
311Cyberwarfare / Internet / Denial-of-service attacks / Internet protocols / Denial-of-service attack / Internet Relay Chat / Firewall / Transmission Control Protocol / IP multicast / Computing / Network architecture / Computer network security

A DoS-limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-08-18 18:59:06
312Cyberwarfare / Transmission Control Protocol / Firewall / Pcap / Packet capture / Tcpdump / Traffic flow / Denial-of-service attack / National Energy Research Scientific Computing Center / Software / Computer network security / Computing

Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic Stefan Kornexl Vern Paxson Holger Dreger TU M¨unchen ICSI / LBNL TU M¨unchen Abstract There are times when it would be extrao

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2005-08-11 15:51:44
313Spamming / Botnets / Cyberwarfare / Computer security / FireEye /  Inc. / Denial-of-service attack / BredoLab botnet / Zombie / Waledac botnet / Computer network security / Computing / Multi-agent systems

Harvard Journal of Law & Technology Volume 28, Number 1 Fall 2014 MICROSOFT THE BOTNET HUNTER: THE ROLE OF PUBLIC-PRIVATE PARTNERSHIPS IN MITIGATING BOTNETS

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2015-04-09 10:45:05
314Denial-of-service attacks / Network architecture / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Border Gateway Protocol / Traceroute / Transmission Control Protocol / Bogon / Computer network security / Computing / Internet

The Spoofer Project Rob Beverly <> MIT CSAIL March 30, 2005

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:44:25
315Internet / Network architecture / Denial-of-service attack / Resolver / IP address spoofing / Latency / Name server / Throughput / Transmission Control Protocol / Network performance / Computer network security / Computing

Temporal Lensing and its Application in Pulsing Denial of Service Attacks Ryan Rasti Mukul Murthy Vern Paxson

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2014-05-26 14:37:07
316Computing / Cyberwarfare / Radio-frequency identification / Verisign / Denial-of-service attacks / Denial-of-service attack / Root name server / Internet security / Botnet / Computer network security / Domain name system / Internet

VRSN_logo_vertical_CMYK_vector

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2015-04-16 16:20:08
317Computer security / Spamming / Malware / Goods / Public good / Phishing / Rootkit / Computer worm / Denial-of-service attack / Cyberwarfare / Computer network security / Security

C:/Users/zhdong/Dropbox/Papers/NSPW12/SocialPower_v7.dvi

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2012-08-03 18:24:29
318Network architecture / Network intrusion detection system / Denial-of-service attack / Intrusion detection system / Packet capture / Firewall / Router / Packet loss / Network forensics / Computer network security / Computing / Software

Enriching Network Security Analysis with Time Travel Gregor Maier Robin Sommer Holger Dreger

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-30 11:46:33
319Spamming / Botnets / Internet Relay Chat / Storm botnet / Peer-to-peer / Internet Relay Chat bot / Fast flux / Denial-of-service attack / Storm Worm / Computing / Computer network security / Multi-agent systems

Discovery techniques for P2P botnets David Dittrich Applied Physics Laboratory University of Washington

Add to Reading List

Source URL: jjcweb.jjay.cuny.edu

Language: English - Date: 2014-12-03 00:00:08
320Computer network security / Multi-agent systems / Electronic commerce / Botnets / Internet bot / Rustock botnet / Denial-of-service attack / Web search query / Click fraud / Computing / Spamming / Internet

SBotMiner: Large Scale Search Bot Detection Fang Yu, Yinglian Xie, and Qifa Ke Microsoft Research Silicon Valley Mountain View, CAUSA fangyu,yxie,

Add to Reading List

Source URL: www.wsdm-conference.org

Language: English - Date: 2009-12-30 02:07:56
UPDATE