Denial-of-service attack

Results: 1246



#Item
41File sharing networks / Inter-process communication / File sharing / Clientserver model / Network architecture / Distributed computing / Peer-to-peer / Server / Gnutella / Denial-of-service attack / Social peer-to-peer processes / JXTA

1 Clippee: A Large-Scale Client/Peer System Keno Albrecht, Ruedi Arnold, Roger Wattenhofer {kenoa,rarnold,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland

Add to Reading List

Source URL: ruedi-arnold.com

Language: English - Date: 2011-12-23 03:13:22
42Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Cybercrime / Computer network security / Denial-of-service attack / Computer security / Simple Service Discovery Protocol / Ransomware / Extortion

The 3 Typical Stages of DDoS Extortion Gain an understanding of the tools, actors and motivations to better thwart attacks One of the most popular means to facilitate extortion is through DDoS attacks. These types of att

Add to Reading List

Source URL: info.digitalshadows.com

Language: English - Date: 2016-07-18 12:30:59
43Computational science / Computer graphics / Infographics / Visualization / Cyberwarfare / Denial-of-service attack / Intrusion detection system / Information visualization / Computer security / Data visualization / Visual analytics

Microsoft Word - 20050515_SOUPS Malviz_final.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
44Network protocols / Internet protocols / Denial-of-service attacks / Transmission Control Protocol / Hypertext Transfer Protocol / TCP Fast Open / Traversal Using Relays around NAT / Denial-of-service attack / SYN cookies / Server Message Block

ASAP: A Low-Latency Transport Layer Qingxi Li, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey Dept. of Computer Science, University of Illinois at Urbana-Champaign Urbana, Illinois, USA , wzhou10@illin

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:51:35
45Domain name system / Cyberwarfare / Internet Standards / Internet protocols / Internet security / Name server / Cloudmark / Denial-of-service attack / Botnet / Domain Name System Security Extensions / Comparison of DNS server software

Microsoft Word - DNS Whitepaper_Resource Exhaustion_October_2014_v2.docx

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2014-10-07 15:50:23
46Computer security / Computer network security / Cyberwarfare / Cryptography / National security / Threat / STRIDE / Attack / SQL injection / Denial-of-service attack

Microsoft PowerPoint - DenimGroup_SecondMostSecureDatabase_Content.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:14
47Cyberwarfare / Computational linguistics / Automatic identification and data capture / Computer accessibility / Speech recognition / Mel-frequency cepstrum / Computer security / Denial-of-service attack / Artificial neural network / CMU Sphinx / Vector / CAPTCHA

Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-06-29 23:07:54
48Domain name system / Cyberwarfare / Malware / Computer network security / Internet protocols / Malware analysis / Botnet / OpenDNS / Name server / Denial-of-service attack / Root name server / Payload

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-21 09:55:27
49Cyberwarfare / Denial-of-service attacks / Computer network security / Internet Relay Chat / Denial-of-service attack / DDoS mitigation / Botnet / Computer security / BlockDos / Draft:Corero Network Security

Whitepaper Industrial Control System Security COVER

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-05-16 11:11:13
50Generally Accepted Accounting Principles / Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Financial statements / Statement of changes in equity / Earnings before interest /  taxes /  depreciation /  and amortization / Financial ratio / Balance sheet / Denial-of-service attack / Investment / DDoS mitigation

26 MarchCorero Network Security plc (AIM: CNS) (“Corero” or the “Company”) Full year results

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-03-26 04:51:36
UPDATE