Paxson

Results: 276



#Item
2219 / Meek Cutoff / Harrisons

CROSSING THE PLAINS Personal Recollections of the Journey to Oregon in 1852 by Mrs. J. T. Gowdy of McMinnville, OR First written in Dayton, Yamhill County, Oregon, September, 1906, for Dorothy Paxson Nelson by Anne Kemp

Add to Reading List

Source URL: www.oregonpioneers.com

Language: English - Date: 2008-10-31 12:55:27
222Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-10-02 07:34:55
223Malware / Computing / Rootkit / Botnet / Fast flux / Computer virus / Antivirus software / Cyberwarfare / Computer security

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook Christian Rossow∗‡ , Christian J. Dietrich∗ , Chris Grier†§ , Christian Kreibich†§ , Vern Paxson†§ , Norbert Pohlmann∗ , Herber

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2012-03-17 04:52:06
224Impact assessment / Methodology / Design of experiments / Epidemiology / Randomized controlled trial / Program evaluation / Welfare / Child abuse / Peter R. Orszag / Evaluation / Science / Evaluation methods

P OLICY BR IEF FALL[removed]Social Science Rising: A Tale of Evidence Shaping Public Policy Ron Haskins, Christina Paxson, and Jeanne Brooks-Gunn Rigorous social science evaluations of home-visiting programs designed to im

Add to Reading List

Source URL: futureofchildren.org

Language: English - Date: 2010-10-27 21:18:48
225Code Red / Warhol worm / Morris worm / Nimda / Computer virus / Windows / Port scanner / Anti-worm / Blaster / System software / Software / Computer worms

How to 0wn the Internet in Your Spare Time Stuart Staniford∗ Silicon Defense Vern Paxson† ICSI Center for Internet Research

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-09-03 14:32:18
226Welchia / Morris worm / Blaster / Witty / SQL Slammer / Stration / Server Message Block / Computer virus / Computer security / System software / Computer worms / Software

A Worst-Case Worm ∗ Nicholas Weaver International Computer Science Institute [removed] Vern Paxson

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2012-08-16 12:31:00
227Data security / Computer network security / Cyberwarfare / Port scanner / Nmap / Firewall / Anomaly detection / Transmission Control Protocol / Communications protocol / Computing / Software / Network architecture

Fast Portscan Detection Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA USA jyjung, awberge

Add to Reading List

Source URL: nms.lcs.mit.edu

Language: English - Date: 2004-09-13 14:07:58
228Internet / Cyberwarfare / Internet standards / Network performance / Data security / Firewall / Packet loss / Transmission Control Protocol / Denial-of-service attack / Computer network security / Computing / Network architecture

Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics Mark Handley and Vern Paxson AT&T Center for Internet Research at ICSI (ACIRI) International Computer Science Institute Berke

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-18 13:11:50
229Computer security / Intrusion detection system / Network intrusion detection system / Snort / Vern Paxson / Bro / Computer network security / System software / Software

Considerations and Pitfalls for Conducting Intrusion Detection Research Vern Paxson International Computer Science Institute and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-07-18 13:47:40
230Communications protocol / Secure Shell / Stepping Stones / Computing / Data / Information / Transmission Control Protocol

Detecting Stepping Stones Yin Zhang and Vern Paxson Abstract The problem of detecting stepping stones was first addressed in a ground-breaking paper by Staniford-Chen and

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-03-21 12:21:19
UPDATE