Denial-of-service attack

Results: 1246



#Item
1Whitepaper  Distributed Denial of Service (DDoS) If a DDoS attack occurs, what is the cost to your business? Denial of Service (DoS) attacks in various forms have existed for decades

Whitepaper Distributed Denial of Service (DDoS) If a DDoS attack occurs, what is the cost to your business? Denial of Service (DoS) attacks in various forms have existed for decades

Add to Reading List

Source URL: www.nttsecurity.com

- Date: 2016-07-26 13:04:53
    2On the Security of the Automatic Dependent Surveillance-Broadcast Protocol arXiv:1307.3664v2 [cs.CR] 15 AprMartin Strohmeier∗ , Vincent Lenders+ , Ivan Martinovic∗

    On the Security of the Automatic Dependent Surveillance-Broadcast Protocol arXiv:1307.3664v2 [cs.CR] 15 AprMartin Strohmeier∗ , Vincent Lenders+ , Ivan Martinovic∗

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2014-12-19 11:12:15
    3Fuzzing  Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

    Fuzzing Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-07-06 08:58:36
    4Towards User-Centric Metrics for Denial-Of-Service Measurement Jelena Mirkovic Alefiya Hussain University of Delaware SPARTA, Inc. Peter Reiher

    Towards User-Centric Metrics for Denial-Of-Service Measurement Jelena Mirkovic Alefiya Hussain University of Delaware SPARTA, Inc. Peter Reiher

    Add to Reading List

    Source URL: www.lasr.cs.ucla.edu

    Language: English - Date: 2015-06-05 18:13:26
    5An ideal Internet Early Warning System Dominique Petersen and Norbert Pohlmann Institute for Internet Security University of Applied Sciences Gelsenkirchen {petersen, pohlmann}@internet-sicherheit.de Abstract

    An ideal Internet Early Warning System Dominique Petersen and Norbert Pohlmann Institute for Internet Security University of Applied Sciences Gelsenkirchen {petersen, pohlmann}@internet-sicherheit.de Abstract

    Add to Reading List

    Source URL: norbert-pohlmann.com

    Language: English - Date: 2015-10-20 12:57:45
    6On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC  2 ETH Zurich, Switzerland

    On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

    Add to Reading List

    Source URL: inspire.edu.gr

    Language: English - Date: 2016-04-22 11:14:02
    7Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

    Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

    Add to Reading List

    Source URL: www.winlab.rutgers.edu

    Language: English
    8ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-01-13 03:12:31
    9C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

    C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-07-08 13:42:23
    10COGECO_Peer_1_Logo_v2_WHITE

    COGECO_Peer_1_Logo_v2_WHITE

    Add to Reading List

    Source URL: www.cogecopeer1.com

    Language: English - Date: 2016-07-20 15:41:15