Internet traffic

Results: 1449



#Item
121Technology / Security / E-commerce / Computer network security / Internet / New media / Telegraphy / Computer security / Windows 10 / User guide / Operating system

eGrants System Applicant User Guide Nevada Traffic Safety eGrants System Applicant User Guide

Add to Reading List

Source URL: egrants.nv.gov

Language: English - Date: 2015-01-31 09:12:09
122

According to a report titled “Aggregation and Provisional Calculation of Internet Traffic in Japan,” which was published by the Ministry of Internal Affairs and Communications on April 3, 2015, as of November 2014 th

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-12-27 21:34:14
    123

    Differentiated  Treatment  of  Internet  Traffic     A  BROADBAND  INTERNET  TECHNICAL  ADVISORY  GROUP   TECHNICAL  WORKING  GROUP  REPORT        

    Add to Reading List

    Source URL: www.bitag.org

    Language: English - Date: 2015-10-07 15:23:46
      124Marketing / Internet marketing / Regression analysis / Estimation theory / Online advertising / Logistic regression / AdSense / Conversion marketing

      Traffic Quality based Pricing in Paid Search using Two-Stage Regression Rouben Amirbekian, Ye Chen, Alan Lu, Tak W. Yan, Liangzhong Yin Microsoft Corporation, 1020 Enterprise Way, Sunnyvale, CA 94089 {roamirbe,yec,alanl

      Add to Reading List

      Source URL: www2013.wwwconference.org

      Language: English - Date: 2014-07-21 08:46:54
      125

      Eliminating Steganography in Internet Traffic with Active Wardens Gina Fisk†§ , Mike Fisk† , Christos Papadopoulos§, and Josh Neil†§ † §

      Add to Reading List

      Source URL: www.gray-world.net

      Language: English - Date: 2010-06-12 03:14:41
        126

        CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

        Add to Reading List

        Source URL: blog.cj2s.de

        Language: English - Date: 2012-10-24 10:24:18
          127Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network

          On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2006-10-10 13:39:42
          128Computing / Network performance / Computer network security / Computer security / Internet privacy / Transmission Control Protocol / Packet loss / Proxy server / Deep packet inspection / Voice over IP / Traffic shaping / Firewall

          Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2013-09-04 16:00:20
          129Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

          Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

          Add to Reading List

          Source URL: www0.cs.ucl.ac.uk

          Language: English - Date: 2013-10-10 06:49:00
          130

          Internet Video Delivery in YouTube: From Traffic Measurements to Quality of Experience Tobias Hoßfeld1, Raimund Schatz2 , Ernst Biersack3 , and Louis Plissonneau4 1 2

          Add to Reading List

          Source URL: www.e-biersack.eu

          Language: English - Date: 2013-07-01 09:51:22
            UPDATE