Network Security

Results: 23614



#Item
931Computer network security / Network architecture / Computer networking / Crypto-anarchism / Internet privacy / Virtual private network / Routing / Traffic flow / Computer network

Traffic Matrix Estimation for Low-loss Routing in Hybrid Networks by George Manning Porter Research Project Submitted to the Department of Electrical Engineering and Computer Sciences, University of California at Berkele

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-11 21:34:04
932Cyberwarfare / Denial-of-service attacks / Computer network security / Internet Relay Chat / Distributed computing / Denial-of-service attack / International Symposium on Reliable Distributed Systems / Computer security / Peer-to-peer / Attack / UDP flood attack / Computer network

Mr. Zhang Fu PERSONAL INFORMATION Surname: Fu Given name: Zhang Date of Birth: 13 OCT 1982 Email:

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2012-10-16 05:28:25
933Information technology management / Computer network security / Manufacturing / Business process management / OpenConnect / Productivity / Automation

work IQ badges_PMS_COLORS

Add to Reading List

Source URL: www.oc.com

Language: English - Date: 2016-06-24 11:28:03
934Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Vulnerability

Greenbone Security Manager x-ray your network The Oering

Add to Reading List

Source URL: greenbone.net

Language: English - Date: 2016-08-18 03:23:24
935Computer access control / Cryptography / Computer network security / Smart card / Ubiquitous computing / Authentication / Computer security / Mobile device / IPhone / Security token

Mobility in Healthcare Easy access and control of medical information Secure Identification in Healthcare

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:39
936Cyberwarfare / Computer network security / Peer-to-peer / Botnet / Hosts / Denial-of-service attack / Public-key cryptography / Computer security / Fabric of Security

Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
937Computer network security / Reputation management / Sybil attack / Distributed data storage / Cryptocurrencies / Networks / Reputation system / Sibyl / Distributed hash table / Sybil / Dash / Community structure

Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2011-12-17 12:10:14
938Cryptographic protocols / Internet protocols / IPsec / Tunneling protocols / Computer network security / Internet security / Internet Key Exchange / Internet layer / Internet Security Association and Key Management Protocol / Security service / Security Parameter Index / Layer 2 Tunneling Protocol

Network Working Group Request for Comments: 2401 Obsoletes: 1825 Category: Standards Track S. Kent

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-11-01 16:21:19
939Computer network security / Wireless networking / IEEE 802.11 / Wi-Fi / Cryptographic protocols / Wi-Fi Protected Access / Router / Wired Equivalent Privacy / Wardriving / Pharming / Computer security / Wireless router

WiFi networks and malware epidemiology Hao Hua,b, Steven Myersb, Vittoria Colizzac, and Alessandro Vespignanib,c,1 aDepartment of Physics, Indiana University, 727 East Third Street, Bloomington, IN 47405; bSchool of Info

Add to Reading List

Source URL: www.epicx-lab.com

Language: English - Date: 2012-09-08 12:43:38
940Software testing / Computer network security / Hacking / Vulnerability / GrammaTech / Computer security

Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Neutralizing Exploitable Vulnerabilities in Software Program Manager: Mr. W. Konrad Vesey; E-mail: How can we benefit

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
UPDATE