Transmission security

Results: 1396



#Item
91Computer networking / Computing / Routing / Data transmission / Ethernet / Named data networking / Computer network security / Forwarding plane / Forwarding information base / Packet forwarding / Router / Port forwarding

NDN, Technical Report NDN-0028, 2015. http://named-data.net/techreports.html Revision 1: January 27, ndnSIM 2.0: A new version of the NDN simulator

Add to Reading List

Source URL: named-data.net

Language: English - Date: 2015-02-03 17:01:51
92Computing / Software / System software / Computer network security / Parallel computing / Intrusion detection systems / Computer security / Deep packet inspection / Network processor / Internet protocol suite / Bro / Transmission Control Protocol

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:02
93Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: faculty.cse.tamu.edu

Language: English - Date: 2013-08-28 15:18:02
94Internet privacy / Secure communication / Computer networking / Cryptographic protocols / Transport Layer Security / Proxy server / Transmission Control Protocol / HTTPS / Internet protocol suite / Session Initiation Protocol

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2016-01-05 05:04:04
95Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-11-02 11:01:00
96Computing / Network performance / Computer network security / Computer security / Internet privacy / Transmission Control Protocol / Packet loss / Proxy server / Deep packet inspection / Voice over IP / Traffic shaping / Firewall

Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-09-04 16:00:20
97Computing / Data mining / Computer security / Information technology management / Anomaly detection / Data security / Intrusion detection system / Information technology / Anomaly / GridFTP / Transmission Control Protocol

Anomaly Detection and Diagnosis in Grid Environments Lingyun Yang1 Chuang Liu2 1

Add to Reading List

Source URL: sc07.supercomputing.org

Language: English - Date: 2007-10-05 15:33:58
98Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2007-07-26 16:56:51
99Computing / Technology / Digital media / Network telescope / Internet / Darknet / Transmission Control Protocol / Scanner / Port scanner

An Internet-Wide View of Internet-Wide Scanning Zakir Durumeric, Michael Bailey, J. Alex Halderman University of Michigan USENIX  Security  ’14      ·∙      San  Diego,  CA

Add to Reading List

Source URL: zakird.com

Language: English
100Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:49:00
UPDATE