Spoofing

Results: 545



#Item
21Financial markets / Futures exchanges / Mathematical finance / Stock market / Spoofing / Commodity Futures Trading Commission / Futures contract / Commodity market / Derivative / Bart Chilton / New York Mercantile Exchange / Algorithmic trading

REPORT Futures & Derivatives Law The Journal on the Law of Investment & Risk Management Products

Add to Reading List

Source URL: deltastrategygroup.com

Language: English - Date: 2016-07-06 13:36:52
22Linear algebra / Vectors / Vector calculus / Machine learning / Computational linguistics / Speech synthesis / Speaker recognition / High-level synthesis / Euclidean vector / Vector space / Computer security / Linear subspace

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. X, NO. X, MONTH 20XX 1 Joint Speaker Verification and Anti-Spoofing in the i-Vector Space

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
23Domain name system / Internet protocols / Internet Standards / Domain Name System Security Extensions / Name server / DNS zone / Content delivery network / IPv6 / Uniform Resource Name / DNS spoofing / Time to live

Internet Engineering Task Force (IETF) Request for Comments: 7871 Category: Informational ISSN: C. Contavalli

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2016-05-20 16:24:42
24Cloud computing / Computer security / Computer access control / Computer network security / Virtual private cloud / Cloud computing security / Authentication / Internet security / Privileged identity management

denial-of-service spoofing application delivery controller (ADC)

Add to Reading List

Source URL: cloudschool.com

Language: English - Date: 2016-06-06 17:05:54
25Network performance / Internet security / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol / Measuring network throughput / IP address spoofing / TCP congestion control

2015 IEEE Symposium on Security and Privacy Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:08
26United States securities law / 73rd United States Congress / U.S. Securities and Exchange Commission / Self-regulatory organizations / Stock market / Securities Exchange Act / Securities regulation in the United States / Financial Industry Regulatory Authority / Spoofing

OMB APPROVAL OMB Number: Estimated average burden hours per response

Add to Reading List

Source URL: cdn.batstrading.com

Language: English - Date: 2016-03-30 12:23:48
27Computer network security / IP address spoofing / Spoofing attack / Wireless security / Wireless LAN / ARP spoofing / MAC address / IEEE 802.11 / Spoof / Computer network / MAC filtering / Computer security

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:06
28Computer network security / Wireless networking / Deep packet capture / Packet analyzer / Pcap / Transmission Control Protocol / Wireshark / Raw socket / Ping / Tcpdump / Packet injection / Packetsquare

Laboratory for Computer Security Education 1 Packet Sniffing and Spoofing Lab cWenliang Du, Syracuse University.

Add to Reading List

Source URL: www.cis.syr.edu

Language: English - Date: 2010-01-06 15:07:49
29Domain name system / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Denial-of-service attack / Name server / Localhost / DNS spoofing / Google Public DNS

University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-02-14 04:49:27
30Computer network security / Navigation / Global Positioning System / Spoofing attack / GPS signals / Authentication / Satellite navigation / Computer security

15. SCPNT_Coop Authentication_Gao_2014.pptx

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2014-11-10 19:11:29
UPDATE