Distributed firewall

Results: 118



#Item
31Toward Understanding Distributed Blackhole Placement Evan Cooke, Michael Bailey, Z. Morley Mao, Danny McPherson David Watson, Farnam Jahanian University of Michigan Arbor Networks

Toward Understanding Distributed Blackhole Placement Evan Cooke, Michael Bailey, Z. Morley Mao, Danny McPherson David Watson, Farnam Jahanian University of Michigan Arbor Networks

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-02 14:39:14
32Delegating Network Security with More Information Jad Naous Ryan Stutsman  Stanford University

Delegating Network Security with More Information Jad Naous Ryan Stutsman Stanford University

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-09-12 02:13:18
33A Framework for A Collaborative DDoS Defense George Oikonomou, Jelena Mirkovic University of Delaware oikonomo,

A Framework for A Collaborative DDoS Defense George Oikonomou, Jelena Mirkovic University of Delaware oikonomo,

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-11-28 14:29:34
34Copyright 2003 AT&T and Lumeta. All Rights Reserved. Notice: For personal use only. These materials may not be reproduced or distributed in any form or by any means except that they may be downloaded from this source

Copyright 2003 AT&T and Lumeta. All Rights Reserved. Notice: For personal use only. These materials may not be reproduced or distributed in any form or by any means except that they may be downloaded from this source

Add to Reading List

Source URL: www.wilyhacker.com.

Language: English - Date: 2004-11-16 15:11:46
35Practical Declarative Network Management Timothy Hinrichs Natasha Gude  Martin Casado

Practical Declarative Network Management Timothy Hinrichs Natasha Gude Martin Casado

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 22:02:42
36A Policy-aware Switching Layer for Data Centers Dilip A. Joseph [removed] Arsalan Tavakoli [removed]

A Policy-aware Switching Layer for Data Centers Dilip A. Joseph [removed] Arsalan Tavakoli [removed]

Add to Reading List

Source URL: ccr.sigcomm.org

Language: English - Date: 2008-07-23 12:32:55
37Demystifying cluster-based fault-tolerant Firewalls P. Neira, R.M. Gasca L. Lef`evre

Demystifying cluster-based fault-tolerant Firewalls P. Neira, R.M. Gasca L. Lef`evre

Add to Reading List

Source URL: 1984.lsi.us.es

Language: English - Date: 2010-01-12 07:22:00
38DefensePro Data Sheet  DefensePro: DDoS Protection and Attack Mitigation Protect the Data Center and Network Against Emerging Network Threats In today’s info-security threat landscape, denial of service and distributed

DefensePro Data Sheet DefensePro: DDoS Protection and Attack Mitigation Protect the Data Center and Network Against Emerging Network Threats In today’s info-security threat landscape, denial of service and distributed

Add to Reading List

Source URL: www.radware.com

Language: English - Date: 2015-04-14 15:45:14
39“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-09 17:34:04
40DCOM – Secure by Default

DCOM – Secure by Default

Add to Reading List

Source URL: www.kepware.com

Language: English - Date: 2015-02-17 10:49:24