Internet traffic

Results: 1449



#Item
641File sharing / Internet privacy / BitTorrent / Kazaa / Tor / Transmission Control Protocol / Software / Computing / File sharing networks

Internet Archeology: Estimating Individual Application Trends in Incomplete Historic Traffic Traces Sebastian Zander, Nigel Williams, Grenville Armitage {szander,niwilliams,garmitage}@swin.edu.au http://www.caia.swin.edu

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2010-09-09 01:11:40
642Software / Proxy servers / Computer networking / Network performance / Tor / Transmission Control Protocol / Traffic analysis / Cross-validation / Internet privacy / Computing / Internet

Website Fingerprinting in Onion Routing Based Anonymization Networks Andriy Panchenko Lukas Niessen

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2011-10-26 06:05:33
643Traffic analysis / Email / Padding / RSA / Internet Relay Chat flood / Degree of anonymity / Cryptography / Public-key cryptography / Mixminion

Practical Traffic Analysis: Extending and Resisting Statistical Disclosure Nick Mathewson and Roger Dingledine The Free Haven Project {nickm,arma}@freehaven.net

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2007-02-09 23:46:31
644Streaming / Cisco Systems / Netflow / Cisco Catalyst / Supervisor Engine / IP multicast / Cisco IOS / IPv6 / Traffic flow / Network architecture / Computing / Internet

Key findings and conclusions:  Tests achieved over 926 Gbps of L2 and L3 switching capacity and over 240 million packets/sec forwarding rates, with traffic applied on 384 GigE ports on eight 48-port line cards, and on

Add to Reading List

Source URL: miercom.com

Language: English - Date: 2015-01-12 12:14:38
645

vendredi 5 octobreServer Traffic: Internal vs. Internet fromtoEntire organization Multiple sending counted n

Add to Reading List

Source URL: www.promodag.com

- Date: 2012-10-05 11:43:13
    646Internet / Tor / Onion routing / Proxy server / Anonymizer / Crowds / Node / ANts P2P / Traffic analysis / Internet privacy / Computing / Software

    NRL Release NumberLocating Hidden Servers Lasse Øverlier Norwegian Defence Research Establishment and Gjøvik University College

    Add to Reading List

    Source URL: www.nrl.navy.mil

    Language: English - Date: 2013-04-26 11:14:57
    647Roaming / Termination rates / Broadband / Mobile virtual network operator / Hutchison 3G / Mobile telephony / Tru / Internet access / Access network / Technology / Wireless / Mobile technology

    INTUG Response to Action Items from CISP-45, June 2011 INTUG is pleased to provide comments on the following Items: - Item 4: International Mobile Roaming: Draft Council Recommendation - Item 5: Internet Traffic Exchange

    Add to Reading List

    Source URL: intug.org

    Language: English - Date: 2013-03-12 19:00:00
    648Pricing / Ticket / Traffic ticket / Law / Technology / Justice / Flat rate / Internet access / Mobile Web

    2014 Theatre Hire Charges Minimum booking time is 3hrs All prices subject to GST All Burrinja staff are charged at a minimum of 3 hrs. Penalty rates will apply to public holidays and time worked after midnight. *Availabi

    Add to Reading List

    Source URL: burrinja.org.au

    Language: English - Date: 2014-11-17 02:20:37
    649Internet privacy / Classified information / Information sensitivity / Traffic Light Protocol

    Traffic Light Protocol (TLP) Matrix The Traffic Light Protocol (TLP) is a set of designations used to ensure that sensitive information is shared with the correct audience. It employs four colors to indicate different de

    Add to Reading List

    Source URL: www.ncsc.govt.nz

    Language: English - Date: 2015-03-10 17:20:50
    650Network architecture / Transmission Control Protocol / Netstat / Internet security / Internet Protocol / Traffic flow / Internet protocol suite / Internet Control Message Protocol / Denial-of-service attack / Computer network security / Computing / Data

    A Look Back at “Security Problems in the TCP/IP Protocol Suite” Steven M. Bellovin AT&T Labs—Research [removed] Abstract About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol s

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2009-09-07 11:25:24
    UPDATE