Discovery Network

Results: 677



#Item
111IEEE 802 / IEEE standards / Working groups / Networking hardware / IEEE 802.3 / Virtual LAN / Link aggregation / Link Layer Discovery Protocol / Network switch / Ethernet / OSI protocols / Computing

Industrial Switches PRODUCT INFORMATION IE200 Series INDUSTRIAL MANAGED PoE+ SWITCHES

Add to Reading List

Source URL: www.alliedtelesis.com

Language: English - Date: 2015-03-24 15:35:10
112Denial-of-service attack / Computing / Computer network security / Alert correlation / Alert messaging

Constructing Attack Scenarios through Correlation of Intrusion Alerts Peng Ning Yun Cui

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:01
113Computing / Routing / Dynamic Source Routing / B.A.T.M.A.N. / Wireless networking / Network architecture / Ad hoc On-Demand Distance Vector Routing

How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 Peng Ning and Kun Sun Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:59
114System software / Internet Control Message Protocol / Ping / Traceroute / TCP/IP stack fingerprinting / Computer network security / ICMP Address Mask Request / Path MTU Discovery / Denial-of-service attacks / Computing / Internet protocols / Internet

ICMP Usage in Scanning Version 2.01 ICMP Usage in Scanning1 Or

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:28
115Hierarchy / Patterns / Political culture / Computing / Lightweight Directory Access Protocol / Internet / Network architecture / Directory services / Internet protocols / Internet standards

World Leading Discovery Technology White Paper: Alternative Hierarchies Identity Management and XML Directory Services Solutions

Add to Reading List

Source URL: www.viewds.com

Language: English - Date: 2015-03-12 00:59:39
116Beacon / Wireless sensor network

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks∗ Donggang Liu Peng Ning North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:08
117Technology / Wireless networking / Electronics / Sensor node / Node / Networks / Wireless sensor network / Computer networking / Computing

A Framework for Identifying Compromised Nodes in Wireless Sensor Networks QING ZHANG, TING YU, and PENG NING North Carolina State University Sensor networks are often subject to physical attacks. Once a node’s cryptog

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
118Computing / Sensor node / ANT / Estimation theory / Location estimation in sensor networks / Wireless security / Wireless sensor network / Telecommunications engineering / Technology

Attack-Resistant Location Estimation in Sensor Networks Donggang Liu and Peng Ning Wenliang Kevin Du North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
119Network management / Internet standards / Ethernet / Internet protocols / Network protocols / RADIUS / Simple Network Management Protocol / Link Layer Discovery Protocol / IEEE 802.3 / Computing / Network architecture / OSI protocols

ATelesis_Black_5stripeREV

Add to Reading List

Source URL: www.alliedtelesis.com.au

Language: English - Date: 2015-04-28 05:24:33
120Internet protocols / Internet standards / Internet Control Message Protocol / Computer network security / Path MTU Discovery / ICMPv6 / ICMP Destination Unreachable / Transmission Control Protocol / Ip / Computing / Network architecture / Internet

Microsoft Word - draft-ietf-tcpm-icmp-attacks-00.txt

Add to Reading List

Source URL: www.gont.com.ar

Language: English - Date: 2011-11-08 11:19:24
UPDATE