Security architecture

Results: 5312



#Item
321Computing / Internet protocols / Network architecture / Computer network security / Cyberwarfare / Transmission Control Protocol / HTTP cookie / Port / Network packet / Firewall / Network socket / Application layer

Protocol-Independent Adaptive Replay of Application Dialog Weidong Cui† , Vern Paxson‡ , Nicholas C. Weaver‡ , Randy H. Katz† † University of California, Berkeley, CA ‡ International Computer Science Institut

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:00
322Computer network security / Computing / Virtual private networks / Crypto-anarchism / Internet privacy / Network architecture / Cyberwarfare / Computer security

Microsoft Word - UTSI VPN Connection.docx

Add to Reading List

Source URL: cs.utsi.edu

Language: English - Date: 2013-10-03 17:02:20
323Computing / Software / System software / Computer network security / Computer networking / Data security / Cyberwarfare / Wireless networking / Firewall / Transmission Control Protocol / Packet analyzer / Packet loss

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:08
324Computing / Cyberwarfare / Computer network security / Computer networking / OpenFlow / Network architecture / Software-defined networking / Nox / Firewall / Computer network / Computer security / Denial-of-service attack

A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
325Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
326Computing / Internet / Domain name system / Network architecture / Internet protocols / Internet Standards / Internet security / DNSSEC / Domain Name System Security Extensions / DNS spoofing / Google Public DNS / Name server

Hold-On: Protecting Against On-Path DNS Poisoning Haixin Duan∗ , Nicholas Weaver†¶ , Zongxu Zhao∗ , Meng Hu∗ , Jinjin Liang∗ , Jian Jiang∗ , Kang Li‡ and Vern Paxson†§ ∗ Tsinghua University, Beijing,

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:07
327Government / Critical infrastructure protection / Infrastructure / Security engineering / United States Department of Homeland Security / National security / Office of the Inspector General /  U.S. Department of Defense / Department of Defense Architecture Framework / Defense Technical Information Center / United States Military Standard / Defense Information Systems Agency / Global Information Grid

DoD Instruction, February 2, 2015

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2015-02-02 14:52:32
328Computing / Computer architecture / Software / Graphics hardware / Video cards / Hyper-V / Windows Server / General-purpose computing on graphics processing units / Graphics processing unit / Framebuffer / Hypervisor / Virtualization

Graphical User Interface for Virtualized Mobile Handsets Janis Danisevskis, Michael Peter, Jan Nordholz, Matthias Petschick and Julian Vetter Security in Telecommunications Technische Universit¨at Berlin Email: {janis,p

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:56
329Computing / Network architecture / Computer networking / Network protocols / Computer network security / Ethernet / Streaming / Middlebox / Multiprotocol Label Switching / Router / Network address translation / Forwarding plane

SoftCell: Scalable and Flexible Cellular Core Network Architecture Xin Jin† , Li Erran Li? , Laurent Vanbever† , and Jennifer Rexford† Princeton University† , Bell Labs? ABSTRACT

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2013-11-04 08:44:37
330Backup / Data security / Floppy disk / DOS / Computing / Computer file / Computer architecture / Technology

UNPROTECTED Backups may be made using standard copying procedures. F

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
UPDATE