Network traffic control

Results: 798



#Item
101Internet standards / Streaming / Internet protocols / Local area networks / Virtual LAN / Transmission Control Protocol / User Datagram Protocol / Traffic flow / OpenFlow / Network architecture / Internet / Computing

OpenFlow Switch Specification VersionWire Protocol 0x01) December 31, 2009 ONF TS-001 OpenFlow Switch Specification

Add to Reading List

Source URL: www.opennetworking.org

Language: English - Date: 2015-05-05 15:02:28
102Data / Information / Network intelligence / Communications protocol / IP Flow Information Export / Application firewall / OSI model / Transmission Control Protocol / Traffic flow / Computing / Deep packet inspection / Computer network security

Product Datasheet Qosmos DPI Virtual Networking Function Component (VNFC) The Qosmos DPI VNFC complies with the ETSI NFV reference design and provides service-awareness to virtual networking functions (VNFs). Suppliers

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:09:09
103Streaming algorithm / Network architecture / Traffic flow / Packet Processing / Transmission Control Protocol / Lossy compression / Computing / Computer networking / Algorithms

Network data streaming: a computer scientist’s journey in signal processing Jun (Jim) Xu Networking and Telecommunications Group College of Computing

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2007-07-08 13:36:51
104Network architecture / Tor / Transmission Control Protocol / Proxy server / Traffic analysis / Support vector machine / Onion routing / Internet privacy / Computing / Internet

Improved Website Fingerprinting on Tor Tao Wang Ian Goldberg Cheriton School of Computer Science

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2013-09-04 10:17:14
105Computer network security / P0f / TCP/IP / Pcap / Transmission Control Protocol / Traffic flow / Cyberwarfare / Packet loss / Network address translation / Software / Computing / System software

Finding  Needles  in  Haystacks  (the  Size  of  Countries)   By  Michael  Baker,  David  Turnbull,  Gerald  Kaszuba     Abstract   The  lament  of  security

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:05
106System software / Port scanner / Universal Plug and Play / Transmission Control Protocol / User Datagram Protocol / Portmap / Port / SOCKS / Traffic flow / Computing / Internet protocols / Network architecture

SnortALog V2.4.1 The log begins at : The log ends at : Sep 17 15:47:16 Dec 1 00:06:06

Add to Reading List

Source URL: jeremy.chartier.free.fr

Language: English - Date: 2011-03-29 05:46:57
107Network architecture / Internet privacy / Computer networking / Network performance / SOCKS / Proxy server / Internet standards / Transmission Control Protocol / Port / Computing / Internet / Internet protocols

Inferno Nettverk A/S Dante Technical Specification 1 Data Traffic Log Format

Add to Reading List

Source URL: www.inet.no

Language: English - Date: 2011-03-21 09:29:07
108Data / Transmission Control Protocol / Packet loss / TCP tuning / Transport layer / Goodput / Throughput / Traffic flow / AirPort / Network performance / Computing / Network architecture

Ruckus WiFi Evaluation Stuart Cheshire, B.A., M.A., M.Sc., Ph.D. nospam nospam

Add to Reading List

Source URL: www.stuartcheshire.org

Language: English - Date: 2006-12-29 17:38:29
109Network architecture / Tor / Traffic analysis / Proxy server / Onion routing / .onion / Internet Relay Chat / Peer-to-peer / Transmission Control Protocol / Internet privacy / Computing / Internet

TOP SECRET//COMINTU//FOUO) Tor 2006 CES Summer Program Abstract (U) Tor is an open-source anonymization program created by Roger Dingledine, Nick Mathewson, and Paul Syverson. Originally sponsored by the US N

Add to Reading List

Source URL: www.queen.clara.net

Language: English - Date: 2013-12-23 19:26:24
110Computing / Computer security / Denial-of-service attack / Internet Relay Chat / SYN flood / Transmission Control Protocol / UDP flood attack / Traffic flow / Ping flood / Denial-of-service attacks / Computer network security / Cyberwarfare

Taxonomy of DDoS Attacks Attack Types T C P

Add to Reading List

Source URL: hudsonvalleyhost.com

Language: English - Date: 2015-02-01 15:50:19
UPDATE