IEEE Internet Computing

Results: 576



#Item
71Routing / Link-state routing protocol / Packet forwarding / IP multicast / Multicast / IEEE 802.1aq / Network topology / Network architecture / Internet / Computing

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARYEfficient and Dynamic Routing Topology Inference From End-to-End Measurements

Add to Reading List

Source URL: www.ifp.illinois.edu

Language: English - Date: 2010-07-21 12:11:11
72HTTP / Computer crimes / Computer network security / Internet ethics / Cross-site request forgery / HTTP cookie / Phishing / Internet privacy / JavaScript / Software / Computing / Google Chrome

All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian, Carnegie Me

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
73Computer network security / Internet protocols / Phishing / Social engineering / Spamming / DNS spoofing / Intrusion detection system / Domain Name System / Database / Computing / Cybercrime / Internet

Poster: “Quilt: A system for distributed queries of security-relevant data” Dr. Timothy Shimeall and George M. Jones and Derrick H. Karimi CERT/Software Engineering Institute Carnegie-Mellon University Pittsburgh, Pe

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-17 10:01:51
74Business ethics / Advance-fee fraud / Lottery scam / Email spam / Email fraud / Spam / Internet fraud / Anti-spam techniques / Email / Spamming / Internet / Computing

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-05 16:29:48
75Network address translation / Computer network security / TCP/IP stack fingerprinting / IPv4 / IP address / Private network / Transmission Control Protocol / Network protocols / Network architecture / Internet / Computing

2014 IEEE Security and Privacy Workshops Can we identify NAT behavior by analyzing Traffic Flows? YaseminGokcen

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:08
76Science / Protected health information / De-identification / Self-report study / Geographic information system / Internet privacy / Data privacy / Research ethics / Research methods

Poster: Privacy and De-Identification in High-Dimensional Social Science Datasets A. Cheyenne Solomon*, Raquel Hill*, Erick Janssen**, and Stephanie Sanders** * School of Informatics and Computing, Indiana University **

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-05-18 11:12:44
77Vehicular ad-hoc network / Internet Protocol / Universal Mobile Telecommunications System / IEEE 802.11p / Electronics / 11P / 3GPP Long Term Evolution / Computer cluster / 4G / Computing / Wireless networking / Technology

Bachelor’s/Master’s Thesis Centralized Cluster Coordination in Heterogeneous Networks In recent years a new trend of vehicular networking emerged: heterogeneous networks. For many applications neither ad-hoc

Add to Reading List

Source URL: www.ccs-labs.org

Language: English - Date: 2014-05-20 04:06:14
78Wireless networking / Internet / Data / Computer network security / IEEE 802.1X / Computing / Eduroam / RADIUS

Wireless @ Johns Hopkins ‘eduroam’ Configuration Guide: MAC OS 10.8 Mountain Lion Johns Hopkins has joined the eduroam (education roaming) federation. Membership allows campus community members at any participating i

Add to Reading List

Source URL: www.it.johnshopkins.edu

Language: English
79Telecommunications engineering / IEEE 802.1X / Protected Extensible Authentication Protocol / Extensible Authentication Protocol / Wireless Zero Configuration / Wireless LAN / Xsupplicant / Authentication protocol / Internet Authentication Service / Wireless networking / Computing / Technology

How to configure 802.1x PEAP authentication for Windows XP wired connections The described below is based on the Windows XP Professional edition Service Pack 3. PEAP (Protected Extensible Authentication Protocol) is a ve

Add to Reading List

Source URL: www.eur.nl

Language: English - Date: 2009-12-22 08:24:48
80Network architecture / IEEE standards / Internet protocol suite / PHY / JetDirect / Cisco / OSI protocols / Ethernet / Computing

Microsoft Word - DL4500-EDH+ Spec Sheet.doc

Add to Reading List

Source URL: www.equustek.com

Language: English - Date: 2015-01-06 00:15:15
UPDATE