Transmission security

Results: 1396



#Item
221Networking hardware / Middlebox / Firewall / Packet Processing / Application firewall / Load balancing / Packet switching / Transmission Control Protocol / Multi-core processor / Computing / Computer network security / Computer networking

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2012-11-27 06:23:17
222Transmission Control Protocol / Microsoft SQL Server / Data / Network architecture / Computer network security / Internet protocols / Port / Computing

Attachment 3 Observation by the Internet Fixed-Point Monitoring System (TALOT2) for OctoberTo General Internet Users According to the Internet Fixed-Point Monitoring System (TALOT2), 109,390 unwanted (one-sided

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:48
223CommView / Wireless networking / Information / Transmission Control Protocol / Network packet / IP address / Packet capture / Cyberwarfare / Packet injection / Computer network security / Computing / Network architecture

CommView Tutorial ® Packet Sniffing Is Fun!

Add to Reading List

Source URL: www.tamos.com

Language: English - Date: 2008-03-23 09:45:14
224Privacy / Electric power distribution / Electric power transmission systems / Smart grid / Smart meter / Electrical grid / Privacy policy / Consumer privacy / Internet privacy / Electric power / Energy / Technology

DOC No. INFOSOCDATE ISSUED: JUNE 2011 Resolution lution on Privacy and Security Related

Add to Reading List

Source URL: epic.org

Language: English - Date: 2011-06-27 13:48:53
225Network architecture / Network performance / Cryptographic software / Tor / Onion routing / Network congestion / Proxy server / Denial-of-service attack / Transmission Control Protocol / Internet privacy / Computing / Internet

A Practical Congestion Attack on Tor Using Long Paths Nathan S. Evans Colorado Research Institute for Security and Privacy University of Denver Email:

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2009-06-11 20:30:09
226Electric power / Energy in the United Kingdom / Electromagnetism / Electric power distribution / Electricity market / Electric power transmission / Office of Gas and Electricity Markets / Energy security / Energy industry / Energy / Energy economics / Energy development

Economy, Energy and Tourism Committee Security of Supply Call for Written Evidence Remit “Scotland’s energy needs in a changing UK electricity market – an inquiry into security of supply. The four themes will be: s

Add to Reading List

Source URL: www.scottish.parliament.uk

Language: English - Date: 2015-05-01 04:02:46
227Energy development / Energy policy / Electric power transmission systems / Electric power distribution / Energy security / Energy supply / Energy industry / Electrical grid / Smart grid / Energy / Technology / Energy economics

SMALL HYDRO – A SIGNIFICANT CONTRIBUTOR TO THE LOCAL GRID SAFETY? Jacek MALKO Stanisław LEWANDOWSKI, Janusz STELLER Adam ADAMKOWSKI

Add to Reading List

Source URL: www.esha.be

Language: English - Date: 2008-06-17 10:27:58
228Internet / Computer network security / Cyberwarfare / Data security / Firewall / Transmission Control Protocol / Port / Trivial File Transfer Protocol / Telnet / Internet protocols / Computing / Network architecture

OR : How to put up a Firewall when surrounded by users R. Hughes-Jones SysMan Sep 98 Firewall Architectures Packet Filtering

Add to Reading List

Source URL: hepwww.rl.ac.uk

Language: English - Date: 2007-05-14 10:18:37
229United States Department of Homeland Security / Government / Security / Emerging technologies / Smart grid / Smart / Critical infrastructure protection / Electrical grid / Critical infrastructure / National security / Electric power transmission systems / Infrastructure

CRITIS 2013 programme v130911

Add to Reading List

Source URL: www.critis2013.nl

Language: English - Date: 2013-09-14 07:20:21
230Computing / Shellcode / Kerberos / X86 / Ticket / Stack / Transmission Control Protocol / Computer network security / Computer architecture / Cyberwarfare

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
UPDATE