Spoofing

Results: 545



#Item
41Computing / Security / Humancomputer interaction / Automatic identification and data capture / Computational linguistics / Speech processing / Computer network security / Computer accessibility / Speech recognition / Speaker recognition / Biometrics / Spoofing attack

Human vs Machine Spoofing Detection on Wideband and Narrowband Data Mirjam Wester1 , Zhizheng Wu1 , Junichi Yamagishi1,2 1 The Centre for Speech Technology Research, The University of Edinburgh, UK 2

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
42Domain name system / Computing / Internet / Network architecture / OpenDNS / Domain Name System Security Extensions / Name server / Root name server / DNS spoofing / Proxy server / Reverse DNS lookup / Extension mechanisms for DNS

Implications of Netalyzr’s DNS Measurements Nicholas Weaver Christian Kreibich Boris Nechaev

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:04
43Computing / Internet / Cryptography / Cybercrime / Internet Standards / Internet protocols / Cyberwarfare / National security / Denial-of-service attack / Computer security / Border Gateway Protocol / DNS spoofing

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 18:31:26
44Computer networking / Cache / Named data networking / DNS spoofing / Web cache / Content centric networking / Hypertext Transfer Protocol / Interest Flooding Attack / Forwarding plane / Probability distribution

Efficient Content Verification in Named Data Networking Dohyung Kim Sunwook Nam Sungkyunkwan University

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:11:48
45Internet / Computing / Domain name system / Cryptography / Internet protocols / Internet Standards / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / Name server / DNS spoofing / DNS hijacking

MSc System and Network Engineering Research Project II Discovery method for a DNSSEC validating stub resolver

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2015-08-24 06:37:35
46Computing / Internet / Network architecture / Internet protocols / Domain name system / Internet Standards / Network address translation / DNS spoofing / Proxy server / Dynamic Host Configuration Protocol / Name server / Hypertext Transfer Protocol

Netalyzr: Illuminating The Edge Network Christian Kreibich Nicholas Weaver ICSI

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:09
47

BATS FILES CLIENT SUSPENSION RULE TO EXPEDITE ACTION AGAINST CUSTOMERS ENGAGING IN LAYERING AND SPOOFING Enables the Exchange to Quickly Stop Customers Engaging in Manipulative Behavior KANSAS CITY and NEW YORK – July

Add to Reading List

Source URL: cdn.batstrading.com

Language: English - Date: 2015-07-30 09:05:14
    48

    DLL Spoofing in Windows By Andreas Björklund, Johan Klövstedt and Sven Westergren What is spoofing? A program run under Windows gains the full capabilities of the user that runs it. If

    Add to Reading List

    Source URL: www.it.uu.se

    Language: English - Date: 2005-10-18 10:24:49
      49Computing / Internet / Domain name system / Network architecture / Internet protocols / Internet Standards / Internet security / DNSSEC / Domain Name System Security Extensions / DNS spoofing / Google Public DNS / Name server

      Hold-On: Protecting Against On-Path DNS Poisoning Haixin Duan∗ , Nicholas Weaver†¶ , Zongxu Zhao∗ , Meng Hu∗ , Jinjin Liang∗ , Jian Jiang∗ , Kang Li‡ and Vern Paxson†§ ∗ Tsinghua University, Beijing,

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:07
      50Computing / Internet / Internet protocols / Domain name system / Cache / Internet Standards / DNS spoofing / Name server / Load balancing / Content delivery network / Time to live / Comparison of DNS server software

      ECO-DNS: Expected Consistency Optimization for DNS Chen Chen Carnegie Mellon University

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:11
      UPDATE