<--- Back to Details
First PageDocument Content
De-perimeterisation / Electronics / Videotelephony / Electronic engineering / Router / Voice over IP / Security / Virtual private network / Computing / Computer network security / Data security
Date: 2014-12-16 19:06:35
De-perimeterisation
Electronics
Videotelephony
Electronic engineering
Router
Voice over IP
Security
Virtual private network
Computing
Computer network security
Data security

Add to Reading List

Source URL: www.blackhat.com

Download Document from Source Website

File Size: 192,93 KB

Share Document on Facebook

Similar Documents

Computing / Routing protocols / Data transmission / Network architecture / Internet architecture / Internet Standards / Internet protocols / Routing algorithms / Constraint / Open Shortest Path First / Link-state routing protocol / Router

1 Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

DocID: 1xVAh - View Document

Computing / Routing protocols / Data transmission / Network architecture / Internet architecture / Internet Standards / Internet protocols / Routing algorithms / Constraint / Open Shortest Path First / Link-state routing protocol / Router

1 Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

DocID: 1xUCT - View Document

Computing / Internet architecture / Network architecture / Information and communications technology / Routing / Internet Standards / Computer networking / Border Gateway Protocol / Router / Control plane / IP routing / NetFlow

Leveraging Router Programmability for Traffic Matrix Computation ⇤ Giacomo Balestra‡

DocID: 1xUmh - View Document

PDF Document

DocID: 1wULk - View Document

PDF Document

DocID: 1wgdG - View Document