Denial-of-service attack

Results: 1246



#Item
661Traffic flow / Denial-of-service attack / Anomaly detection / Transmission Control Protocol / OSI protocols / Computer network security / Computing / Intrusion detection system

Network Anomaly Detection Using Autonomous System Flow Aggregates To appear, GLOBECOM[removed]Draft version Thienne Johnson and Loukas Lazos Department of Electrical and Computer Engineering University of Arizona, Tucson,

Add to Reading List

Source URL: netvue.cs.arizona.edu

Language: English - Date: 2014-10-16 13:25:04
662Cyberwarfare / Computer security / Smurf attack / Ingress filtering / Denial-of-service attack / Firewall / Traceroute / Transmission Control Protocol / Traffic flow / Computer network security / Computing / Denial-of-service attacks

Detecting Spoofed Packets Steven J. Templeton, Karl E. Levitt Department of Computer Science U.C. Davis {templets,levitt}@cs.ucdavis.edu Abstract

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:49:33
663Computer network security / Denial-of-service attack / Malware / Yandex / SMS / Crime / International Cybercrime / Computer crimes / Technology / Mobile technology

Cybercrime in Russia: Trends and issues Robert Lipovsky, Aleksandr Matrosov and Dmitry Volkov Agenda General cybercrime trends in 2010 Most prevalent threats and incidents

Add to Reading List

Source URL: go.eset.com

Language: English - Date: 2011-05-18 11:23:20
664Software / Denial-of-service attack / Snort / Intrusion detection system / Computer network security / Cyberwarfare / Computer security

THE BOOTSTRAP OF MULTIPLE REGRESSION COEFFICIENT ESTIMATING

Add to Reading List

Source URL: www.li.mahidol.ac.th

Language: English - Date: 2006-11-15 03:11:14
665Android / Smartphones / Embedded Linux / Cloud clients / Android software development / Google / Linux kernel / Fork bomb / Network socket / Software / Computing / System software

Would You Mind Forking This Process? A Denial of Service attack on Android (and Some Countermeasures)∗† Alessandro Armando DIST, Università degli Studi di Genova, Italy, [removed]

Add to Reading List

Source URL: www.ai-lab.it

Language: English - Date: 2012-04-12 22:22:48
666Computer security / Computing / Smurf attack / Denial-of-service attack / SYN flood / IP address spoofing / Ping / LAND / Stateful firewall / Denial-of-service attacks / Computer network security / Cyberwarfare

Configuring DMS Central Control Software to Communicate with VMS Signs Using the PortServer® TS H MEI Serial Server

Add to Reading List

Source URL: ftp1.digi.com

Language: English - Date: 2009-02-03 11:39:26
667Cybercrime / Cyberwarfare / Denial-of-service attacks / Spamming / Denial-of-service attack / Internet Relay Chat / Botnet / Anonymous / Computer network security / Computing / Multi-agent systems

[removed]DDoS Threat Landscape Report Introduction

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2014-03-31 12:42:06
668Botnets / Spamming / Cyberwarfare / Zeus / Malware / Denial-of-service attack / Storm botnet / Srizbi botnet / Computer network security / Computing / Multi-agent systems

Becoming the Six-Million-Dollar Man Diary of a Professional Botmaster

Add to Reading List

Source URL: media.blackhat.com

Language: English
669Cyberwarfare / Computer security / Crime prevention / Electronic commerce / National security / State machine replication / Denial-of-service attack / Byzantine fault tolerance / Side channel attack / Computer network security / Computing / Security

Blueprint for a science of cybersecurity | Fred B. Schneider 1. Introduction

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2012-04-26 11:36:06
670Tacoma /  Washington / Server / X Window System / Denial-of-service attack / Host / Software / Computing / System software

What Tacoma Taught Us Dag Johansen y Fred B. Schneider

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-05-31 13:42:36
UPDATE