Security architecture

Results: 5312



#Item
541X86 architecture / Intel / X86 virtualization / Xeon / Computer network security / System software / Computer hardware / Software

Application Note Intel® Architecture Processors Qosmos* DPI Technology Intel® Architecture

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:08:48
542Delay-tolerant networking / Computing / Telecommunications engineering / Computer network / Public-key cryptography / Node / International Space Station / Interplanetary Internet / Routing in delay-tolerant networking / Spaceflight / Network architecture / Network protocols

Delay / Disruption Tolerant Networking (DTN) Security Key Management Fred L. Templin Mark Anderson, L2

Add to Reading List

Source URL: ipnsig.org

Language: English - Date: 2015-05-26 15:11:58
543Software architecture / World Wide Web / Model–view–controller / Web developer / Web application / Sandbox / Form / Ruby on Rails / Software / Computing / Web development

Bridging the Security Gap with Decentralized Information Flow Control Adam Belay, Andrea Bittau, Dan Boneh, Pablo Buiras*, Daniel Giffin, Amit Levy, Ali Mashtizadeh, David Mazieres, John Mitchell, Alejandro Russo*, Amy S

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-11-15 17:46:54
544Computing / Network architecture / Software / Internet service provider / Computer network / Virtual private network / Tor / Throughput / Internet / Internet privacy / Computer network security / Network performance

Identifying Traffic Differentiation on Cellular Data Networks Arash Molavi Kakhki‡ , Abbas Razaghpanah⋆ , Rajesh Golani⋆ David Choffnes‡ , Phillipa Gill⋆ , Alan Mislove‡ ‡ 1.

Add to Reading List

Source URL: david.choffnes.com

Language: English - Date: 2014-08-25 16:23:28
545Internet / Computer network security / Network congestion / Teletraffic / Router / Denial-of-service attack / Server / Max-min fairness / Network switch / Computing / Network architecture / Network performance

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARYDefending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-01-06 19:55:54
546Lock / Architecture / Pop-a-Lock / Locksmithing / Key / Locksmith

Bureau of Security & Investigative Services - Meeting Materials for February 5, 2015 Advisory Committee Meeting

Add to Reading List

Source URL: bsis.ca.gov

Language: English - Date: 2015-01-23 14:13:03
547TCP/IP / Data / Flow control / Internet protocols / Computer network security / Transmission Control Protocol / TCP congestion avoidance algorithm / Network congestion / Congestion window / Network performance / Computing / Network architecture

Non-Intrusive Scheduling of TCP Flows U. Ayestaa,b,c,d , L. Bertauxa,d , D. Carvina,d LAAS, 7 avenue du colonel Roche, 31400 Toulouse, France b IKERBASQUE, Basque Foundation for Science, 48011 Bilbao, Spain c UPV/EHU, Un

Add to Reading List

Source URL: homepages.laas.fr

Language: English - Date: 2015-03-26 15:40:56
548Firefighting / Fire protection / Door / Firefighter / Occupancy / Security / Architecture / Elevator / Fire alarm system / Safety

EASTERN AREA COORDINATION CENTER

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2014-06-20 16:14:22
549Internet / 6to4 / ICMPv6 / Mobile IP / Multicast address / 6over4 / ISATAP / IPv4 / Neighbor Discovery Protocol / Internet Protocol / Network architecture / IPv6

IPv6 Security: Attacks and Countermeasures in a Nutshell Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar Weippl SBA Research Vienna, Austria Email: (1stletterfirstname)(lastname)@sba-resea

Add to Reading List

Source URL: www.sba-research.org

Language: English - Date: 2014-10-14 04:25:28
550Deep packet inspection / Network architecture / Computer networking / Packet Processing / Mobile data offloading / Quality of service / Transmission Control Protocol / System Architecture Evolution / Deep content inspection / Computing / Computer network security / Electronic engineering

Application Datasheet Mobile Data Offloading Use Case Application awareness to enable data delivery with network technologies complementary to 3G/4G such as WiFi networks or femtocells.

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:07:49
UPDATE