Infocom

Results: 680



#Item
131Network architecture / Computing / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Resolver / OpenDNS / Domain name system / Internet / Internet protocols

Finding DNSSEC Validators with Check-Repeat Duane Wessels April 19, 2013 Joint Work

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-22 11:30:15
132Spamming / File sharing networks / Concurrent computing / Botnets / Storm botnet / Peer-to-peer / Kad network / Malware / DoSnet / Multi-agent systems / Computer network security / Computing

Botnet detection revisited: Theory and Practice of Finding Malicious P2P Networks via Internet Connection Graphs Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D’Alconzo FTW, Vienna, Austria

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:32:55
133

PDF Document

Add to Reading List

Source URL: infocom.di.unimi.it

- Date: 2013-04-30 04:54:00
    134Classes of computers / Amiga games / Adventure games / Zork / Infocom / Zork I / Colossal Cave Adventure / Nuisance / Graham Nelson / Software / Interactive fiction / Digital media

    Go North You are at the North Pole. You are dead from exposure. Game Over. Go North

    Add to Reading List

    Source URL: staff.unak.is

    Language: English - Date: 2009-01-20 13:48:12
    135Satellite Internet / Tooway / Throughput / Internet protocol suite / KA-SAT / Transmission Control Protocol / Internet access / Electronic engineering / Computing / Network performance / Broadband / Internet

    New generation satellite broadband Internet services: should ADSL and 3G worry? Alessio Botta, Antonio Pescapè University of Napoli Federico II {a.botta, pescape}@unina.it

    Add to Reading List

    Source URL: infocom.di.unimi.it

    Language: English - Date: 2013-04-22 11:14:38
    136Pcap / Packet capture / Transmission Control Protocol / GTK+ / Software / Computing / Computer network security

    10 Gbit Line Rate Packet-to-Disk Using n2disk Background Storing the entire raw traffic is required for:

    Add to Reading List

    Source URL: infocom.di.unimi.it

    Language: English - Date: 2013-04-29 06:32:34
    137Electronics / Femtocell / SMS / Ringtone / Technology / Mobile technology / Text messaging

    Rogue Femtocell Owners: How Mallory Can Monitor My Devices David Malone, Darren F. Kavanagh and Niall R. Murphy 19 April 2013

    Add to Reading List

    Source URL: infocom.di.unimi.it

    Language: English - Date: 2013-04-22 11:14:52
    138Data / Active queue management / Bufferbloat / Network congestion / Random early detection / Transmission Control Protocol / Network performance / Network architecture / Computing

    ict-mplane.eu Fighting the bufferbloat: on the coexistence of AQM and LPCC Y. Gong, D. Rossi, C. Testa, S. Valenti Télécom ParisTech, France

    Add to Reading List

    Source URL: infocom.di.unimi.it

    Language: English - Date: 2013-04-29 06:31:56
    139Computing / Computer networking / Data transmission / Queuing delay / Electronic engineering / Transmission Control Protocol / Flow control / TCP/IP / Bufferbloat

    To The Moon and Back are Internet delays really that large? D Chiara Chirichella Dario Rossi

    Add to Reading List

    Source URL: infocom.di.unimi.it

    Language: English - Date: 2013-04-29 06:32:07
    140Traceroute / Tor / Geography of England / Counties of England / Software

    Microsoft PowerPoint - ToR-PoPs-TMA2013.pptx

    Add to Reading List

    Source URL: infocom.di.unimi.it

    Language: English - Date: 2013-04-23 11:14:59
    UPDATE