<--- Back to Details
First PageDocument Content
Computer security / Malware / Network telescope / Denial-of-service attack / Computer worm / Botnet / Computer network security / Computing / Cyberwarfare
Date: 2006-09-29 19:40:51
Computer security
Malware
Network telescope
Denial-of-service attack
Computer worm
Botnet
Computer network security
Computing
Cyberwarfare

Fast and Evasive Attacks: Highlighting the Challenges Ahead

Add to Reading List

Source URL: www.cs.jhu.edu

Download Document from Source Website

File Size: 220,53 KB

Share Document on Facebook

Similar Documents

A Coordinated Approach to K2/Campaign 9: Microlensing Data Reduction and Analysis. Rachel Street Las Cumbres Observatory Global Telescope Network, Inc. The phenomenon of microlensing offers us a glimpse of dark and other

DocID: 1uhWY - View Document

Astronomical imaging / Astronomy / Observational astronomy / Astronomical instruments / Interferometry / Radio astronomy / Radio telescopes / Very-long-baseline interferometry / ASTRON / Telescope / European VLBI Network / Joint Institute for VLBI in Europe

Development of Distributed e-VLBI Data Correlation Technologies in Ventspils International Radio Astronomy Center Normunds Jekabsons1, Karina Krinkele1, Ivars Shmeld1, Dominik Stoklosa222

DocID: 1qPoY - View Document

Telescopes / Science and technology in Chile / National Science Foundation / Cerro Tololo Inter-American Observatory / University of North Carolina at Chapel Hill / Cerro Pachn / Gemini Observatory / National Optical Astronomy Observatory / Large Synoptic Survey Telescope / PROMPT Telescopes / Las Cumbres Observatory Global Telescope Network / Robotic telescope

Microsoft Word - TwoMountainModelDescriptionV5

DocID: 1nLSu - View Document

Network performance / Cyberwarfare / Denial-of-service attacks / Pseudorandom number generator / Measuring network throughput / Network packet / Denial-of-service attack / Network telescope / Witty / Transmission Control Protocol / Code Red / Packet loss

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

DocID: 1kvqF - View Document

Computing / Technology / Digital media / Network telescope / Internet / Darknet / Transmission Control Protocol / Scanner / Port scanner

An Internet-Wide View of Internet-Wide Scanning Zakir Durumeric, Michael Bailey, J. Alex Halderman University of Michigan USENIX  Security  ’14      ·∙      San  Diego,  CA

DocID: 1jUVC - View Document