IP address spoofing

Results: 87



#Item
1FAIR: Forwarding Accountability for Internet Reputability Christos Pappas Raphael M. Reischuk  Adrian Perrig

FAIR: Forwarding Accountability for Internet Reputability Christos Pappas Raphael M. Reischuk Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-09-10 05:14:02
22015 IEEE Symposium on Security and Privacy  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

2015 IEEE Symposium on Security and Privacy Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:08
3Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:06
4White Paper  The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems

White Paper The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems

Add to Reading List

Source URL: www.gtri.com

Language: English - Date: 2014-09-02 15:27:00
5S/Kademlia:  A Practicable Approach Towards Secure Key-Based Routing

S/Kademlia: A Practicable Approach Towards Secure Key-Based Routing

Add to Reading List

Source URL: doc.tm.uka.de

Language: English - Date: 2008-03-25 10:39:00
6Chapter 18: Network Attack and Defense  C H A P TE R 18 Network Attack and Defense

Chapter 18: Network Attack and Defense C H A P TE R 18 Network Attack and Defense

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-10-12 06:34:00
7You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-10 15:32:10
8SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006

SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2014-08-07 12:38:39
9 The AuthorPublished by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email:  doi:comjnl/bxl026 An

 The AuthorPublished by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: doi:comjnl/bxl026 An

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2006-06-27 09:05:07
10TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

Add to Reading List

Source URL: www.enck.org

Language: English