Internet traffic

Results: 1449



#Item
111Computing / Computer network security / Cyberwarfare / Data security / Transmission Control Protocol / Packet injection / Sandvine / Firewall / Traffic flow / Internet protocol suite / Idle scan

Detecting Forged TCP Reset Packets Nicholas Weaver ICSI Robin Sommer

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:05
112Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2014-10-08 09:38:20
113Classes of computers / Personal computing / HTTP Live Streaming / Hypertext Transfer Protocol / Multimedia / Internet / Personal computer / Ovi / Tablet computer / Adaptive bitrate streaming

Web Traffic Report 3. Web Traffic Report Report on Access Log Analysis Results for Streaming Delivery of the 2014 Summer Koshien

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-12-27 21:34:14
114

2015 Best Traffic Records Web page Questionnaire Again for 2015, ATSIP seeks to recognize exemplary work in the field of "Best Traffic Records Web Page". A wealth of information exists on the internet. This questionnaire

Add to Reading List

Source URL: www.trafficrecordsforum.org

Language: English - Date: 2015-03-13 15:05:27
    115Routing protocols / Computer networking / Networking hardware / Router / Server appliance / Internet protocols / Routing / Simulation / Virtual Router Redundancy Protocol / Open Shortest Path First

    Node of the Traffic Network Node on a Route Start / Endnode of a Route

    Add to Reading List

    Source URL: www.strc.ch

    Language: English - Date: 2009-09-16 13:57:03
    116Internet security / Internet Standards / Internet protocols / Secure communication / Dark web / IP hijacking / Tor / Border Gateway Protocol / Traffic analysis / Denial-of-service attack / Transmission Control Protocol

    RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

    Add to Reading List

    Source URL: vanbever.eu

    Language: English - Date: 2015-03-17 04:19:13
    117Transport / Security / Safety / Surveillance / Identity management / Road traffic management / Traffic law / Road safety / Privacy / Internet privacy / Closed-circuit television / Traffic enforcement camera

    Attitudes Toward Vehicle-Based Sensing and Recording Manya Sleeper*, Sebastian Schnorf†, Brian Kemler‡, Sunny Consolvo‡ *Carnegie Mellon University Pittsburgh, PA, USA

    Add to Reading List

    Source URL: manyasleeper.com

    Language: English - Date: 2015-08-31 18:23:04
    118Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Command and control / Storm botnet / Cluster analysis / Internet bot / Hierarchical clustering

    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

    Add to Reading List

    Source URL: faculty.cs.tamu.edu

    Language: English - Date: 2008-05-09 14:43:43
    119Internet Standards / Internet protocols / Routing protocols / Routing / Telecommunications engineering / Border Gateway Protocol / Peering / Internet service provider / Router / Multihoming / Network address translation / Computer network

    Scalable Programmable Inbound Traffic Engineering Peng Sun Laurent Vanbever Jennifer Rexford

    Add to Reading List

    Source URL: vanbever.eu

    Language: English - Date: 2015-05-23 04:42:57
    120Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network

    Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

    Add to Reading List

    Source URL: vanbever.eu

    Language: English - Date: 2014-10-08 09:38:20
    UPDATE