Uploads
Contact
/
Login
Upload
Search Results for 'Security Packets'
What computers talk about and how.
natalia-silvester
1 Connecticut Invention Convention
mitsue-stanley
The Dark Menace:
pasty-toler
The Dark Menace:
stefany-barnette
SDN challenges
conchita-marotz
Eliminating Gray Holes in Mobile Ad hoc Network Discovering
stefany-barnette
Multi-Core Packet Scattering to Disentangle Performance Bot
myesha-ticknor
Overcoming the Antennas-Per-AP Throughput Limit in MIMO
lois-ondreau
Overcoming the Antennas-Per-AP Throughput Limit in MIMO
debby-jeon
Detection of Promiscuous nodes Using Arp Packets
debby-jeon
WinPcap Do’s and Don’ts
pamella-moone
Privacy-Preserving and Truthful Detection of Packet Droppin
conchita-marotz
Artificial Intelligence in Networking:
celsa-spraggs
NEIGHBORHOOD WATCH: SECURITY AND PRIVACY ANALYSIS OF AUTOMA
test
Packet PWE3 – Efficient for IP/MPLS
lindy-dunigan
Port Knocking
lindy-dunigan
Rules of Packet Transmission
olivia-moreira
Packaging samples for irradiation
mitsue-stanley
Inferring Internet Denial-of-Service Activity
lindy-dunigan
draft-ietf-ippm-loss-episode-metrics-00
sherrill-nordquist
Fault-Tolerant and Secure Distributed Data
lindy-dunigan
The Needle in the Haystack
natalia-silvester
Packet Chaining: Efficient Single-Cycle Allocation for On-C
sherrill-nordquist
Aleks Security Cyber Security Inc.
liane-varnes
1
2
3
4
5
6
7
8