Internet traffic

Results: 1449



#Item
201Marketing / Business models / Website / Online shopping / Small business / AdSense / Internet / Electronic commerce / Business / Internet marketing

1. Introduction The Netwriting Masters Course, written by Ken Evoy, President of SiteSell.com, is an intensive course on writing high value content that builds targeted traffic, PREsells

Add to Reading List

Source URL: leehopkins.com

Language: English - Date: 2010-09-09 00:56:30
202Voice over IP / Videotelephony / Computer network security / Internet privacy / Broadband / Skype protocol / Deep packet inspection / Tor / Traffic shaping / Software / Computing / Skype

SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-08-25 10:47:50
203Internet standards / Streaming / Internet protocols / Local area networks / Virtual LAN / Transmission Control Protocol / User Datagram Protocol / Traffic flow / OpenFlow / Network architecture / Internet / Computing

OpenFlow Switch Specification VersionWire Protocol 0x01) December 31, 2009 ONF TS-001 OpenFlow Switch Specification

Add to Reading List

Source URL: groups.geni.net

Language: English - Date: 2015-05-25 10:10:48
204Direct marketing / Mobile marketing / Affiliate marketing / Digital marketing / Ad:tech / Marketing / Business / Internet marketing

August 24, 2015 | Hilton NY Midtown Online Traffic and Conversions—For Business & Consumer Marketers Join us for a pre-conference event @LeadsCon New York for insights into new strategies and technologies for driving s

Add to Reading List

Source URL: cdn.leadscon.com

Language: English - Date: 2015-05-29 09:37:01
205Onion routing / Tor / Universal composability / Routing / Traffic analysis / Public-key cryptography / Communications protocol / Cryptography / Internet privacy / Computing

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-03-20 11:08:29
206Akamai Technologies / Content delivery network / Domain name system / Networks / Distributed data storage / CNAME record / Computing / Internet / Concurrent computing

Traffic Engineering for CDNs Matt Jansen Akamai Technologies BDNOG3 The Akamai Intelligent Platform

Add to Reading List

Source URL: www.bdnog.org

Language: English - Date: 2015-05-25 05:24:01
207Cryptographic software / Onion routing / Tor / Universal composability / Traffic analysis / Public-key cryptography / Crowds / Cryptography / Internet privacy / Routing

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Aniket Kate Esfandiar Mohammadi Saarland University and MPI-SWS University of Waterloo

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-04-29 17:48:07
208Network performance / Network architecture / Streaming / File sharing networks / Tor / Onion routing / Throughput / Quality of service / Proxy server / Computing / Internet / Internet privacy

The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting∗ Mashael AlSabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg {malsabah,k4bauer,mtelahi,iang}@cs.uwaterloo.ca Cheriton School of Computer Sc

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-04-26 00:01:43
209Internet / Tor / Onion routing / Traffic analysis / Relay / Proxy server / Computer insecurity / Freenet / I2P / Software / Internet privacy / Computing

Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2013-03-07 16:53:15
210Netflow / Network management / Inter-process communication / Internet protocols / Traffic flow / Computer network security / IP Flow Information Export / Transmission Control Protocol / Routing / Computing / Network architecture / Internet

Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu D. M. Chiu

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-12-14 03:07:20
UPDATE