×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [attack sources]
Optimal source based filtering of malicious traffic.bak
10.531 views
Hii php super_globals_supersized_trouble
473 views
Guerilla Security
537 views
FIRCOL
19 views
Loose Source Routing as a Mechanism for Traffic Policies Katerina Argyraki and David R. Cheriton Presented by Thuan Huynh, Robert Patro, and Shomir Wilson
215 views
IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented
222 views
SEC 318 Guerilla Security – Securing Exchange 2000 and 2003 Infrastructures Fred Baumhardt and Rab Thynne Senior and Partner Strategy Consultant Microsoft
220 views
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Rocky K. C. Chang
235 views
Simple and Complex Threats Shape the Future Linda McCarthy Executive Security Advisor November 22, 2003
214 views
Efficient and Secure Source Authentication with Packet Passports Xin Liu (UC Irvine) Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas
220 views
Future of Government Info Sharing Chris Wysopal CTO & Co-founder Veracode
216 views
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security
220 views
Next >