Firewall

Results: 2502



#Item
771Computer network security / Transmission Control Protocol / Firewall / Middlebox / Communications protocol / Network congestion / Traffic flow / Protocol stack / Data / Computing / Information

Towards an Open Middlebox Platform for Modular Function Composition Shinae Woostudent , Keon Jang*, Dongsu Han, and KyoungSoo Park KAIST, *Microsoft Research , , {dongsuh, kyoungsoo

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2015-02-24 22:20:54
772Data security / Computer network security / Cyberwarfare / Firewall / Port scanner / Nmap / Communications protocol / Transmission Control Protocol / Anomaly detection / Computing / Software / Network architecture

Fast Portscan Detection Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA USA {jyjung, awberg

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-05-13 23:18:43
773SIGCOMM / Communications protocol / Router / Firewall / Internet / Computing / Data / Information

Uses and Challenges for Network Datasets John Heidemann USC/ISI Christos Papadopoulos

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2013-05-17 18:59:26
774Network performance / Computer networking / Transmission Control Protocol / Throughput / Packet Processing / Traffic flow / IPv6 packet / Network packet / Firewall / Computing / Network architecture / Data

Scalable TCP Session Monitoring with Symmetric Receive-side Scaling Shinae Woo KyoungSoo Park

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2015-02-24 22:20:34
775Cyberwarfare / Computer networking / Pcap / Firewall / Transmission Control Protocol / Traffic flow / Internet protocol suite / Packet Processing / Port / Computing / Software / Computer network security

Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory, Berkeley, CA and AT&T Center for Internet Research at ICSI, Berkeley, CA

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 05:22:35
776

Verinet VX9 Load Balancing between 2 datacenters in H10 with BGP and/or Firewall and/or Load Balancer VX9 CAMPUS VX9 CAMPUS

Add to Reading List

Source URL: www.verinet.dk

- Date: 2010-06-08 14:49:12
    777Traffic flow / Firewall / Network architecture / Data / Computing / Computer network security / Transmission Control Protocol

    CSE473S - Introduction to Computer Networking - Laboratory Assignment 2

    Add to Reading List

    Source URL: www.cse.wustl.edu

    Language: English - Date: 2010-02-18 20:57:24
    778Cyberwarfare / Application firewall / Application security / Web application security / Vulnerability / Penetration test / Qualys / Imperva / Database security / Computer network security / Computer security / Computing

    Building a Web Application Security Program Version 1.0 Released: March 9, 2009

    Add to Reading List

    Source URL: securosis.com

    Language: English - Date: 2011-12-01 09:44:13
    779

    G Data ClientSecurity Business Protezione antivirus professionale e client firewall per reti di tutte le dimensioni G Data ClientSecurity offre una protezione completa da qualsiasi tipo di virus, trojan, spam e hacker co

    Add to Reading List

    Source URL: www.avkitalia.it

    Language: Italian - Date: 2014-06-19 12:21:06
      UPDATE