Spoofing attack

Results: 127



#Item
11Controlling IP Spoofing based DDoS Attacks Through Inter-Domain Packet Filters∗ Zhenhai Duan†, Xin Yuan, and Jaideep Chandrashekar Abstract The Distributed Denial of Services (DDoS) attack is a serious threat to the

Controlling IP Spoofing based DDoS Attacks Through Inter-Domain Packet Filters∗ Zhenhai Duan†, Xin Yuan, and Jaideep Chandrashekar Abstract The Distributed Denial of Services (DDoS) attack is a serious threat to the

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2012-09-05 15:29:28
    12Attack Class: Address Spoofing L. Todd Heberlein , Matt Bishop Department of Computer Science University of California Davis, CAAbstract

    Attack Class: Address Spoofing L. Todd Heberlein , Matt Bishop Department of Computer Science University of California Davis, CAAbstract

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2004-06-21 18:55:44
      132014 IEEE Security and Privacy Workshops  Towards Forensic Analysis of Attacks with DNSSEC Haya Shulman and Michael Waidner Fachbereich Informatik Technische Universit¨at Darmstadt

      2014 IEEE Security and Privacy Workshops Towards Forensic Analysis of Attacks with DNSSEC Haya Shulman and Michael Waidner Fachbereich Informatik Technische Universit¨at Darmstadt

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2014-04-30 03:11:51
      14Chapter 18: Network Attack and Defense  C H A P TE R 18 Network Attack and Defense

      Chapter 18: Network Attack and Defense C H A P TE R 18 Network Attack and Defense

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2006-10-12 06:34:00
      15You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

      You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

      Add to Reading List

      Source URL: www.cs.cuhk.hk

      Language: English - Date: 2004-06-10 15:32:10
      16Unmanned Aircraft Capture and Control via GPS Spoofing Andrew J. Kerns Department of Electrical and Computer Engineering The University of Texas at Austin

      Unmanned Aircraft Capture and Control via GPS Spoofing Andrew J. Kerns Department of Electrical and Computer Engineering The University of Texas at Austin

      Add to Reading List

      Source URL: radionavlab.ae.utexas.edu

      Language: English - Date: 2014-04-03 13:55:43
      17SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006

      SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006

      Add to Reading List

      Source URL: www.albany.edu

      Language: English - Date: 2014-08-07 12:38:39
      18 The AuthorPublished by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email:  doi:comjnl/bxl026 An

       The AuthorPublished by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: doi:comjnl/bxl026 An

      Add to Reading List

      Source URL: www.cs.cuhk.hk

      Language: English - Date: 2006-06-27 09:05:07
      19TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

      TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

      Add to Reading List

      Source URL: www.enck.org

      Language: English
      20Testimony and Statement for the Record of  Marc Rotenberg President and Executive Director, Electronic Privacy Information Center Hearing on H.R. 5126, the Truth in Caller ID Act of 2006

      Testimony and Statement for the Record of Marc Rotenberg President and Executive Director, Electronic Privacy Information Center Hearing on H.R. 5126, the Truth in Caller ID Act of 2006

      Add to Reading List

      Source URL: www.epic.org

      Language: English - Date: 2007-09-27 15:32:46