Denial-of-service attacks

Results: 652



#Item
21A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds Yi-Hsuan Kungk , Taeho Lee† , Po-Ning Tsengk , Hsu-Chun Hsiaok ∗ , Tiffany Hyun-Jin Kim‡ ∗ , Soo Bum Lee§ ∗ , Yue-Hsun

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds Yi-Hsuan Kungk , Taeho Lee† , Po-Ning Tsengk , Hsu-Chun Hsiaok ∗ , Tiffany Hyun-Jin Kim‡ ∗ , Soo Bum Lee§ ∗ , Yue-Hsun

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-09-10 05:14:02
22Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
23The 3 Typical Stages of DDoS Extortion Gain an understanding of the tools, actors and motivations to better thwart attacks One of the most popular means to facilitate extortion is through DDoS attacks. These types of att

The 3 Typical Stages of DDoS Extortion Gain an understanding of the tools, actors and motivations to better thwart attacks One of the most popular means to facilitate extortion is through DDoS attacks. These types of att

Add to Reading List

Source URL: info.digitalshadows.com

Language: English - Date: 2016-07-18 12:30:59
24ASAP: A Low-Latency Transport Layer Qingxi Li, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey Dept. of Computer Science, University of Illinois at Urbana-Champaign Urbana, Illinois, USA  , wzhou10@illin

ASAP: A Low-Latency Transport Layer Qingxi Li, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey Dept. of Computer Science, University of Illinois at Urbana-Champaign Urbana, Illinois, USA , wzhou10@illin

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:51:35
25Examining the Internet s Pollution! Karyn Benson! !  2

Examining the Internet s Pollution! Karyn Benson! ! 2

Add to Reading List

Source URL: media.defcon.org

Language: English - Date: 2016-07-07 20:55:52
26Whitepaper Industrial Control System Security COVER

Whitepaper Industrial Control System Security COVER

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-05-16 11:11:13
2726 MarchCorero Network Security plc (AIM: CNS) (“Corero” or the “Company”)  Full year results

26 MarchCorero Network Security plc (AIM: CNS) (“Corero” or the “Company”) Full year results

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-03-26 04:51:36
28C:�rs�ro003�uments�Q�Q�Q�ue2�tractsW29_RA_WangAbstract.wpd

C:rsro003umentsQQQue2tractsW29_RA_WangAbstract.wpd

Add to Reading List

Source URL: www.misq.org

Language: English - Date: 2016-05-09 11:18:17
29Where is in a name? A Survey of Mobility in Information-Centric Networks Gareth Tyson1 , Nishanth Sastry2 , Ruben Cuevas3 , Ivica Rimac4 , and Andreas Mauthe5 1 2

Where is in a name? A Survey of Mobility in Information-Centric Networks Gareth Tyson1 , Nishanth Sastry2 , Ruben Cuevas3 , Ivica Rimac4 , and Andreas Mauthe5 1 2

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2013-02-18 11:45:51
302015 IEEE Symposium on Security and Privacy  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

2015 IEEE Symposium on Security and Privacy Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:08