Spoofing

Results: 545



#Item
411Email / Confidence tricks / Computer-mediated communication / Social engineering / Phishing / Email fraud / Identity theft / Password / Internet fraud / Spamming / Cybercrime / Internet

Phishing / Spoofing What is Phishing or Spoofing? "Phishing" or "Spoofing" emails are made to look like they are sent from reputable companies but are actually sent by cyber-criminals. These types of emails are sent to t

Add to Reading List

Source URL: www.ethra.org

Language: English - Date: 2013-03-22 16:28:13
412Caller ID spoofing / Phishing / Phone hacking / Prank call / Telephone call / Vishing / Phone fraud / Telephony / Caller ID / Electronic engineering

Caller ID Spoofing/Phone Phishing

Add to Reading List

Source URL: www.ag.nd.gov

Language: English - Date: 2012-09-10 09:05:27
413Internet / Firewall / Router / IP traceback / Denial-of-service attack / IP address spoofing / Ingress filtering / Computer network security / Computing / Network architecture

Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2008-10-23 12:44:56
414Network architecture / Domain Name System Security Extensions / DNS spoofing / Name server / DNS zone / Cache / Load balancing / Web search query / Domain name / Domain name system / Internet / Computing

An Empirical Study of the Performance, Security and Privacy Implications of Domain Name Prefetching Srinivas Krishnan and Fabian Monrose Department of Computer Science, University of North Carolina at Chapel Hill, Chapel

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-08-25 20:22:22
415Network architecture / Computer network security / Spamming / Internet protocols / Multi-agent systems / Botnet / Conficker / DNS spoofing / NX technology / Computing / Internet / Domain name system

Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing Srinivas Krishnan, Teryl Taylor, Fabian Monrose John McHugh

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-27 15:45:47
416Domain name system / Internet protocols / Public-key cryptography / Computer network security / DNS spoofing / Hacking / Domain Name System Security Extensions / Man-in-the-middle attack / DNS root zone / Internet / Network architecture / Computing

Backspace Unfinished Business Vinton G. Cerf T

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2013-12-18 23:27:54
417Network architecture / Cyberwarfare / Inter-process communication / Streaming / Traffic flow / Smurf attack / IP address spoofing / Firewall / Denial-of-service attack / Computing / Computer network security / Denial-of-service attacks

USENIX Association Proceedings of the 14th Systems Administration Conference (LISA[removed]New Orleans, Louisiana, USA

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-11 22:53:46
418Computing / Domain Name System Security Extensions / TSIG / DNS spoofing / Name server / DNS root zone / TKEY record / Zone file / DNS zone transfer / Domain name system / Internet / Network architecture

Terena Networking Conference, May 22-25, [removed]DNS Security Antonio Lioy, Fabio Maino, Marius Marian, Daniele Mazzocchi

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-04-04 12:23:03
419Internet / IP traceback / Denial-of-service attacks / Routing protocols / Routing / IP address spoofing / Denial-of-service attack / Router / Communications protocol / Computing / Computer network security / Network architecture

226 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Network Support for IP Traceback Stefan Savage, David Wetherall, Member, IEEE, Anna Karlin, and Tom Anderson

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-17 21:43:15
420Denial-of-service attacks / Cyberwarfare / Multi-agent systems / Computer security / Botnet / Denial-of-service attack / Malware / IP address spoofing / Honeypot / Computer network security / Computing / Spamming

Aachen Department of Computer Science Technical Report Botnet Tracking: Exploring a Root-Cause Methodology to Prevent

Add to Reading List

Source URL: sunsite.informatik.rwth-aachen.de

Language: English - Date: 2006-04-03 08:20:52
UPDATE