Paxson

Results: 276



#Item
51

FOR IMMEDIATE RELEASE August 1, 2014 CONTACT: James Paxson, General Manager, Hacienda

Add to Reading List

Source URL: www.axishealth.org

Language: English - Date: 2014-08-27 18:46:44
    52Computing / Network architecture / Internet / Network protocols / Ethernet / Transmission Control Protocol / Cache / Packet processing / Virtual LAN / Ethernet frame / Internet Protocol / Network switch

    The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention Nicholas Weaver Vern Paxson

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:02
    53

    Network Security DNS, DDOS and Firewalls April 15, 2015 Lecture by Kevin Chen Slides credit: Vern Paxson, Dawn Song 1

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2015-04-22 00:13:31
      54

      Network Security I: Overview April 13, 2015 Lecture by: Kevin Chen Slides credit: Vern Paxson, Dawn Song 1

      Add to Reading List

      Source URL: inst.eecs.berkeley.edu

      Language: English - Date: 2015-04-14 02:09:46
        55

        Issues and Etiquette Concerning Use of Shared Measurement Data Mark Allman Vern Paxson

        Add to Reading List

        Source URL: conferences.sigcomm.org

        Language: English - Date: 2007-08-23 22:12:50
          56

          Ethical Concerns for Censorship Measurement Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver Princeton University, UC Berkeley, International Computer Science Institute Abstract

          Add to Reading List

          Source URL: ensr.oii.ox.ac.uk

          Language: English - Date: 2015-09-24 11:45:38
            57

            Adapting Social Spam Infrastructure for Political Censorship ∗ Kurt Thomas∗ , Chris Grier∗ , Vern Paxson∗† University of California, Berkeley † International Computer Science Institute

            Add to Reading List

            Source URL: www.imchris.org

            Language: English - Date: 2012-04-02 17:12:20
              58Malware / Computer worms / Denial-of-service attacks / SQL Slammer / Warhol worm / Witty / Code Red / Transmission Control Protocol / Transport layer / Computer network security

              The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡

              Add to Reading List

              Source URL: www1.icsi.berkeley.edu

              Language: English - Date: 2012-09-26 16:43:06
              59Network performance / Computing / Network management / Internet security / System software / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol

              Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

              Add to Reading List

              Source URL: icir.org

              Language: English - Date: 2015-04-22 12:30:04
              60Computing / Internet protocols / Network architecture / Computer network security / Cyberwarfare / Transmission Control Protocol / HTTP cookie / Port / Network packet / Firewall / Network socket / Application layer

              Protocol-Independent Adaptive Replay of Application Dialog Weidong Cui† , Vern Paxson‡ , Nicholas C. Weaver‡ , Randy H. Katz† † University of California, Berkeley, CA ‡ International Computer Science Institut

              Add to Reading List

              Source URL: www1.icsi.berkeley.edu

              Language: English - Date: 2012-09-26 16:43:00
              UPDATE