Denial-of-service attacks

Results: 652



#Item
51Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem Marie Vasek, Micah Thornton, and Tyler Moore Computer Science and Engineering Department Southern Methodist University, Dallas, TX Email: {mvasek,m

Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem Marie Vasek, Micah Thornton, and Tyler Moore Computer Science and Engineering Department Southern Methodist University, Dallas, TX Email: {mvasek,m

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-18 12:20:22
52Global Mapping of Cyber Attacks  Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

Add to Reading List

Source URL: www.casos.cs.cmu.edu

Language: English
53Denial of Service Attacks and Defenses The purpose of Information Technology is to enhance and streamline the core competencies of your business. However, when IT security is compromised, it quickly becomes priority one.

Denial of Service Attacks and Defenses The purpose of Information Technology is to enhance and streamline the core competencies of your business. However, when IT security is compromised, it quickly becomes priority one.

Add to Reading List

Source URL: www.casaba.com

Language: English
    54Website Fingerprinting Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier Dominik Herrmann, Hannes Federrath University of Regensburg, Germany

    Website Fingerprinting Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier Dominik Herrmann, Hannes Federrath University of Regensburg, Germany

    Add to Reading List

    Source URL: digitalpiglet.org

    Language: English - Date: 2009-11-27 08:33:02
    55Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†

    Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:10
    56Revisiting Countermeasures Against NDN Interest Flooding Samir Al-Sheikh Matthias Wählisch

    Revisiting Countermeasures Against NDN Interest Flooding Samir Al-Sheikh Matthias Wählisch

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:27:13
    57Consumer / Producer Communication with Application Level Framing in Named Data Networking Ilya Moiseenko UCLA

    Consumer / Producer Communication with Application Level Framing in Named Data Networking Ilya Moiseenko UCLA

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:12:00
    58JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

    JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

    Add to Reading List

    Source URL: www.jpcert.or.jp

    Language: English - Date: 2015-06-29 20:52:09
    59The Top Speed of Flash Worms Stuart Staniford∗ David Moore†  Vern Paxson‡

    The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:06
    60RAPTOR: Routing Attacks on Privacy in Tor  arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

    RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

    Add to Reading List

    Source URL: vanbever.eu

    Language: English - Date: 2015-03-17 04:19:13