×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [attack sources]
Home >
attack sources
Optimal source based filtering of malicious traffic.bak
10.524 views
Hii php super_globals_supersized_trouble
471 views
Guerilla Security
514 views
FIRCOL
19 views
Loose Source Routing as a Mechanism for Traffic Policies Katerina Argyraki and David R. Cheriton Presented by Thuan Huynh, Robert Patro, and Shomir Wilson.
214 views
SEC 318 Guerilla Security – Securing Exchange 2000 and 2003 Infrastructures Fred Baumhardt and Rab Thynne Senior and Partner Strategy Consultant Microsoft.
215 views
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Rocky K. C. Chang.
225 views
Simple and Complex Threats Shape the Future Linda McCarthy Executive Security Advisor November 22, 2003.
213 views
Efficient and Secure Source Authentication with Packet Passports Xin Liu (UC Irvine) Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas.
218 views
Future of Government Info Sharing Chris Wysopal CTO & Co-founder Veracode.
215 views
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
220 views
IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented.
219 views
Next >