Network packet

Results: 2869



#Item
651Internet / Forwarding plane / Forwarding information base / Router / Routing control plane / Routing table / Network switch / Packet forwarding / Packet switching / Network architecture / Routing / Computing

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and shar

Add to Reading List

Source URL: named-data.net

Language: English - Date: 2013-07-09 18:10:00
652Anti-spam / Spam filtering / Computer network security / Deep packet inspection / Computer networking / Barracuda Networks / Microsoft Forefront Threat Management Gateway / Computer appliance / Cloud computing / Computing / System software / Computer security

Protection for Web users inside and beyond the corporate perimeter with unified policy management and reporting Web security is today’s must-address issue. It is difficult to safeguard all Web users from phishing, mali

Add to Reading List

Source URL: www.cpatechnology.net

Language: English - Date: 2015-04-03 10:08:37
653Cisco Systems / Deep packet inspection / Electronics / Computer network security / Cisco IOS / Mobile device management / Cisco Catalyst / Virtual private network / Wi-Fi / Computing / Videotelephony / Electronic engineering

At-A-Glance Beyond BYOD to the Optimal Work Your Way Experience in Healthcare VIRAL ADOPTION OF CONSUMER TABLETS FORCES HEALTHCARE CIO s TO RETHINK THEIR MOBILE TECHNOLOGY STRATEGY. for healthcare productivity and commu

Add to Reading List

Source URL: www.aha-solutions.org

Language: English - Date: 2014-08-13 18:42:32
654Cisco Systems / Videotelephony / Security appliance / Computer network security / Sourcefire / Technology / Electronic engineering / Cisco Career Certifications / Server appliance / Deep packet inspection / Computing

Dear [Partner], Please join the Cisco Security Partner Launch on October 29 th at 8:00 a.m. PT or October 29 th at 8:30 p.m. PT, targeting all our global partners. Learn about the latest Cisco Security innovations and ho

Add to Reading List

Source URL: gblogs.cisco.com

Language: English - Date: 2013-11-10 17:26:26
655Packet capture / Database / Troubleshooting / Business transaction management / Information technology management / Computing / Computer network security / Management / Deep packet capture

CUSTOMER CASE STUDY: MIDDLESEX HOSPITAL Top Hospital Cuts MTTR by 90% with Insight from Real-Time Wire Data “In healthcare, a lot of vendors over-promise and under-deliver. But ExtraHop works as advertised, right out

Add to Reading List

Source URL: www.extrahop.com

Language: English - Date: 2015-04-08 20:00:49
656Computing / Forwarding plane / Forwarding information base / Router / Computer network / IPv4 / IPv6 / Packet forwarding / Link-state routing protocol / Network architecture / Internet / Routing

c IEEE, 2015. This is author’s version of this work. It is posted here by permission of IEEE for you personal use. Not for redistribution. The definitive version was published in the proceedings of IEEE Global Intern

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English
657Computer security / Deep packet capture / FireEye /  Inc. / Packet capture / Netflow / Network forensics / Pcap / Security information and event management / Computing / Software / Computer network security

CUSTOMER STORY Government Agency Reconstructs Attack LifeCycle Using the FireEye Network Forensics Platform

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2015-05-01 03:38:45
658Computing / Internet protocols / Data transmission / Packet loss / Transmission Control Protocol / Retransmission / Transport layer / Communications protocol / Network congestion / Data / Information / Network performance

DS-TP: Deep-Space Transport Protocol. Ioannis Psaras‡ , Giorgos Papastergiou‡ , Vassilis Tsaoussidis‡ and Nestor Peccia? ‡ Department of Electrical and Computer Engineering Democritus University of Thrace 12 Vas.

Add to Reading List

Source URL: www.intersys-lab.org

Language: English - Date: 2010-04-26 14:45:16
659Machine learning / Data / Teletraffic / Streaming / Computer network security / Traffic classification / Deep packet inspection / Traffic flow / Statistical classification / Network performance / Computing / Network architecture

DAINOTTI LAYOUT:56 AM

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 19:24:46
660Computer networking / OSI protocols / Communications protocol / Data transmission / Protocols / OSI model / Network packet / Transmission Control Protocol / Firewall / Data / Computing / Information

From Protocol Stack to Protocol Heap -- Role-Based Architecture (RBA) Bob Braden, Ted Faber USC Information Sciences Institute Mark Handley

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2002-11-05 16:43:56
UPDATE