Hijacking

Results: 635



#Item
321Gulf of Aden / Piracy in Somalia / Transport in Somalia / Horn of Africa / MV Faina / Somalia / United Nations Security Council Resolution / Piracy / Political geography / Africa

The Changing Threat from Somali Pirates and their Major Centers of Activity in[removed]Donna Hopkins Maritime piracy emanating from the Somali coast came to the world’s notice abruptly in late 2008 with the hijacking of

Add to Reading List

Source URL: www.counterpiracy.ae

Language: English - Date: 2012-05-20 10:21:52
322Computing / IP hijacking / Border Gateway Protocol / Peering / Internet transit / Attractor / Internet exchange point / Multihoming / Traffic flow / Network architecture / Routing / Internet

Economics of Traffic Attraction by Transit Providers Pradeep Bangera Carlos III University of Madrid, Spain Abstract—Internet transit is an economy where providers sell traffic-delivery services. Traffic attraction ref

Add to Reading List

Source URL: people.networks.imdea.org

Language: English - Date: 2014-03-25 10:39:50
323National Military Command Center / Military / North American Aerospace Defense Command / Aircraft hijacking / Unmanned aerial vehicle / Piracy / Defense Intelligence Agency / National security / Continuity of government / The Pentagon / Military communications

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-3 DISTRIBUTION: A, B, C, J, S

Add to Reading List

Source URL: 911research.wtc7.net

Language: English - Date: 2005-02-10 08:41:46
324Cybercrime / Internet ethics / Electronic commerce / Social engineering / Email / Phishing / Email spam / Spam / Gmail / Internet / Computing / Spamming

Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild † †

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-11-07 02:25:05
325Internet protocols / Internet standards / Routing protocols / Border Gateway Protocol / Routing / IP hijacking / Network architecture / Internet / Computing

BGP   Border  Gateway  Protocol   EE122  Sec3on  3   Border  Gateway  Protocol  

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2013-10-02 23:29:42
326Computing / Uniform Domain-Name Dispute-Resolution Policy / Anticybersquatting Consumer Protection Act / ICANN / Cybersquatting / Online dispute resolution / Domain name / Reverse domain hijacking / Trademark / Domain name system / Internet / Law

Brooklyn Law Review Volume[removed]

Add to Reading List

Source URL: osaka.law.miami.edu

Language: English - Date: 2002-04-26 12:49:14
327Networks / Distributed data storage / Internet privacy / Domain name system / Content delivery network / Streaming / Proxy server / Load balancing / DNS hijacking / Computing / Concurrent computing / Internet

AT&T TECHNICAL DOCUMENT TD-52AMHL 1 On the Use and Performance of Content Distribution Networks

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2006-04-11 12:53:12
328Routing / Internet standards / Border Gateway Protocol / Traceroute / IP hijacking / Forwarding plane / Shortest path problem / Transmission Control Protocol / IP address / Network architecture / Internet / Computing

Path Stitching: Scalable and Systematic Internet-Wide Path and Delay Estimation from Existing Measurements DK Lee* KAIST

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2010-04-20 04:53:25
329Routing / Internet standards / Internet protocols / IP hijacking / Border Gateway Protocol / Router / Internet backbone / Multihoming / Internet service provider / Network architecture / Internet / Computing

One Tunnel is (Often) Enough Simon Peter, Umar Javed, Qiao Zhang, Doug Woos, Thomas Anderson, Arvind Krishnamurthy University of Washington {simpeter, ujaved, qiao, dwoos, tom, arvind}@cs.washington.edu

Add to Reading List

Source URL: faculty.washington.edu

Language: English - Date: 2014-06-27 15:19:01
330HTTP / Network protocols / Computer network security / HTTP cookie / Internet privacy / Session hijacking / Session fixation / Cross-site scripting / Session management / Computing / Cyberwarfare / Computer security

PUBLIC Session Fixation Vulnerability in Web-based Applications Session Fixation Vulnerability in Web-based Applications Version 1.0 – revision 1

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2010-04-13 10:57:03
UPDATE