Network packet

Results: 2869



#Item
241

BlindBox: Deep Packet Inspection for Encrypted Traffic – Public Review Michael Walfish NYU Today, network administrators use middleboxes to scan and

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:42:28
    242

    Hassan Ahmed Speaking at SDN and NFV: Next Generation Solutions for Network Management Conference 2014 Presentation on “Transforming the Evolved Packet Core with Network Functions Virtualization” Wednesday, December

    Add to Reading List

    Source URL: www.affirmednetworks.com

    - Date: 2015-12-09 16:30:42
      243Cache / Distributed data storage / File sharing / P2P caching / Peer-to-peer file sharing / Peer-to-peer / Ono / Web cache / BitTorrent / Internet service provider / Deep packet inspection / Proactive network provider participation for P2P

      Peer to Peer Edge Caches Should be Free Nicholas Weaver Abstract system centered around the delivery of large data files, either as a single entity (such as BitTorrent [3]) or organized in a streaming fashion (such as Oc

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:01
      244Computing / Network architecture / Internet protocols / Computer networking / Network protocols / Network performance / Internet protocol suite / Packet loss / Transmission Control Protocol / Named data networking / Transport layer / TCP congestion control

      MFTP: A Clean-Slate Transport Protocol for the Information Centric MobilityFirst Network Kai Su, Francesco Bronzino, K. K. Ramakrishnan§ and Dipankar Raychaudhuri WINLAB, Rutgers University, North Brunswick, NJ 08902, U

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2015-10-01 13:18:31
      245Computing / Network architecture / Routing / Computer architecture / Computer networking / Network protocols / Emerging technologies / OpenFlow / Forwarding information base / Software-defined networking / Forwarding / Packet forwarding

      IGP-as-a-Backup for Robust SDN Networks Olivier Tilmans Stefano Vissicchio Universit´e catholique de Louvain

      Add to Reading List

      Source URL: inl.info.ucl.ac.be

      Language: English - Date: 2016-03-05 12:03:17
      246Computing / Routing / Network architecture / Computer networking / Ethernet / OpenFlow / Software-defined networking / Forwarding plane / Packet forwarding / Forwarding / Firewall / Router

      mininet-tcp-multi-field.eps

      Add to Reading List

      Source URL: web.engr.illinois.edu

      Language: English - Date: 2013-02-28 17:28:27
      247Network performance / Computing / Network management / Internet security / System software / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol

      Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

      Add to Reading List

      Source URL: icir.org

      Language: English - Date: 2015-04-22 12:30:04
      248Computing / Internet protocols / Network architecture / Computer network security / Cyberwarfare / Transmission Control Protocol / HTTP cookie / Port / Network packet / Firewall / Network socket / Application layer

      Protocol-Independent Adaptive Replay of Application Dialog Weidong Cui† , Vern Paxson‡ , Nicholas C. Weaver‡ , Randy H. Katz† † University of California, Berkeley, CA ‡ International Computer Science Institut

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:00
      249Computer networking / Computing / Named data networking / Packet loss / Retransmission / Transmission Control Protocol / Traffic flow / Communications protocol / Computer network / Hop / Queuing delay / Network packet

      Active Interest Management for Improving Flow Completion Time in Named-Data Networking Sugi Lee, Yusung Kim Younghoon Kim

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2014-12-01 17:07:38
      250Computing / Software / System software / Computer network security / Computer networking / Data security / Cyberwarfare / Wireless networking / Firewall / Transmission Control Protocol / Packet analyzer / Packet loss

      Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:08
      UPDATE