Discovery Network

Results: 677



#Item
101Internet protocols / Internet standards / Internet Control Message Protocol / Path MTU Discovery / ICMPv6 / ICMP Destination Unreachable / Transmission Control Protocol / Internet Protocol / Ip / Computing / Network architecture / Internet

Microsoft Word - draft-ietf-tcpm-icmp-attacks-01.txt

Add to Reading List

Source URL: www.gont.com.ar

Language: English - Date: 2011-11-08 11:20:20
102Technology / Computing / Wi-Fi / Home automation / Residential gateway / Wireless network / Router / Electronics / Networking hardware / Server appliance / Wireless networking

Step 3 Download app and device discovery Thank you for choosing * Connect Smartphone to same WiFi router that Asante Home Extender is connected to.

Add to Reading List

Source URL: www.asante.com

Language: English - Date: 2015-03-11 18:50:29
103Polymorphic code / Buffer overflow / Assembly languages / Self-modifying code / Computer programming / Shellcode / Polymorphic engine / Addressing mode / Malware / Computing / Software engineering

Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:00
104OWN: Oprah Winfrey Network / The Oprah Winfrey Show / Rachael Ray / Dr. Phil / Nate Berkus / Gayle King / Beloved / Why Not? with Shania Twain / Phil McGraw / Oprah Winfrey / Television / Harpo Productions

FOR IMMEDIATE RELEASE April 8, 2010 Contact: Nicole Nichols: ORBeth Gebhard:

Add to Reading List

Source URL: media.press.discovery.com.s3.amazonaws.com

Language: English - Date: 2014-05-21 00:26:01
105Internet standards / IPv6 / IPv6 packet / Path MTU Discovery / ICMPv6 / IPv4 / Transmission Control Protocol / Maximum transmission unit / Extension mechanisms for DNS / Network architecture / Internet / Internet protocols

University of Amsterdam System and Network Engineering Research Project 1 Making do with what we’ve got: Using PMTUD for a higher DNS

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2013-05-06 07:30:35
106Digital audio / Watermark / Transmission Control Protocol / Latency / Network packet / Information / Paper / Printing / Watermarking / Digital watermarking / Audio watermark detection

On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques∗ Pai Peng Peng Ning Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14
107IEEE 802 / Wireless sensor network / Synchronization / Clocks / Clock synchronization / Sensor node / IEEE 802.15.4 / Communications protocol / Message authentication code / Technology / Computing / Telecommunications engineering

TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
108Computing / Wireless sensor network / IEEE Communications Society / International Conference on Information Processing in Sensor Networks / Wireless security / Telecommunications engineering / Association for Computing Machinery / Ambient intelligence / Support / Wireless networking / International nongovernmental organizations / Technology

Peng Ning (As of MarchDepartment of Computer Science North Carolina State University Telephone: (Email: ; URL: http://www.csc.ncsu.edu/faculty/ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 18:58:42
109Internet protocols / Internet standards / Internet Control Message Protocol / Path MTU Discovery / ICMP Destination Unreachable / ICMPv6 / Internet Protocol / Ip / Transmission Control Protocol / Network architecture / Internet / Computing

Microsoft Word - draft-gont-tcpm-icmp-attacks-03.txt

Add to Reading List

Source URL: www.gont.com.ar

Language: English - Date: 2011-11-08 11:19:31
110Network performance / Transmission Control Protocol / Greedy algorithm / Audio watermark detection / Packet loss / Communications protocol / Data / Information / Computing

Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets∗ Pai Peng, Peng Ning, Douglas S. Reeves Xinyuan Wang Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15
UPDATE