Denial-of-service attack

Results: 1246



#Item
321Peer-to-peer / Bloom filter / Cyberwarfare / Cryptographic hash function / Detective / Denial-of-service attack / ANts P2P / Computer security / Hashing / File sharing networks / Computing

Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman† , Ethan Blanton‡ , Vern Paxson† , Scott Shenker† Computer Science Institute, ‡ Purdue University † International

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-11-16 13:20:37
322Secure communication / Computing / Computer security / Electronic commerce / Crimeware / Data breach / Malware / Denial-of-service attack / Verizon Communications / Computer network security / Security / Cyberwarfare

DBIR_cover_front_CMYK-edit

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2014-06-18 10:04:28
323Electronic commerce / Denial-of-service attacks / Computing / Application firewall / Online shopping / Denial-of-service attack / Cross-site scripting / SQL injection / Cyberwarfare / Computer security / Computer network security

CUSTOMER CASE STUDY CLOUD | COLOCATION | MANAGED SERVICES | DATA CENTERS Major online electronics retailer, OneCall, utilizes TierPoint’s security solutions to protect web

Add to Reading List

Source URL: www.tierpoint.com

Language: English - Date: 2015-01-05 17:46:39
324Computer network / Telecommunications engineering / Communications protocol / Peer-to-peer / Denial-of-service attack / Internet / Data / Information / Computing

Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems∗ † Mark Allman† , Ken Christensen‡ , Bruce Nordman¶ , Vern Paxson†,¶ International Computer Science Institute, ‡ Univer

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-10-23 13:49:33
325Computing / Denial-of-service attack / Marketing research / Software / Computer architecture / Market research / Omnibus / DOS

DataVision Omnibus Survey (DOS) The most cost-effective way of getting the data you need DataVision International LTD (Research & Statistics, ICT, & Corporate Performance Management Consultants)

Add to Reading List

Source URL: www.datavision.co.tz

Language: English - Date: 2015-03-31 04:24:49
326Cyberwarfare / Application firewall / Imperva / Internet fraud / Denial-of-service attack / Web threat / Database activity monitoring / Web fraud detection / Phishing / Computer network security / Computing / Computer security

Web ThreatRadar Stop Automated Attacks and Web Fraud with Industry-first WAF Security Services Harnessing the power of automation, widespread malware infections, and off-the-shelf hacking toolkits, cybercriminals can eas

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2012-05-04 01:38:57
327Software / Multi-agent systems / Computer network security / Internet Information Services / Network management / System administration / Dynamic Host Configuration Protocol / SQL Slammer / Simple Network Management Protocol / Computing / System software / Internet standards

Cyber terrorism/warfare A packet can’t fly a plane… Typical types of attack: –Denial of service –Breeching the perimeter

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
328Internet / Denial-of-service attacks / IP traceback / Routing protocols / Routing / IP address spoofing / Router / Smurf attack / Denial-of-service attack / Computing / Network architecture / Computer network security

Practical Network Support for IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson Department of Computer Science and Engineering University of Washington Seattle, WA, USA

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
329Spamming / Cyberwarfare / Botnets / Denial-of-service attacks / Denial-of-service attack / Fast flux / Storm Worm / Agobot / Internet Relay Chat / Computer network security / Computing / Multi-agent systems

Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods Elizabeth Stinson Stanford University John C. Mitchell

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 22:02:42
330Microsoft Windows / Windows NT / Computer network security / Check Point VPN-1 / Windows / Operating system / Cisco IOS / UnixWare / Denial-of-service attack / Computer architecture / System software / Software

National Infrastructure Protection Center CyberNotes: 2001 Year End Summary Issue #

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 08:53:20
UPDATE