Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
On generating self-similar traffic using pseudo-Pareto distribution - unknown.pdf
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Network
/
Parent Folder
On generating self-similar traffic using pseudo-Pareto distribution - unknown.pdf
PDF
8 years ago
27.71 kB
Copy Link
Off-Path TCP Exploits_Global Rate Limit Considered Dangerous - Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel.pdf
PDF
8 years ago
1.46 MB
Copy Link
On the self-similar nature of Ethernet traffic - Will E. Leland, Walter Willinger, Bellcore, Murad S. Taqqu, Daniel V. Wilson, Department of Mathematics.pdf
PDF
8 years ago
565.57 kB
Copy Link
Multifractal properties of TCP traffic_a numerical study - Rudolf H. Riedi, Jacques LΓ©vy VΓ©hel.pdf
PDF
8 years ago
522.12 kB
Copy Link
Protecting your business against financial and reputational losses with Kaspersky DDoS Protection - Kaspersky Labs.pdf
PDF
8 years ago
799.75 kB
Copy Link
Improving multiple file transfers using SCTP multistreaming - Sourabh Ladha, Paul D. Amer.pdf
PDF
8 years ago
300.83 kB
Copy Link
Self-similarity through high-variability_statistical analysis of Ethernet LAN traffic at the source level - Walter Willinger, Murad S. Taqqu, Robert Sherman, Daniel V. Wilson.pdf
PDF
8 years ago
594.89 kB
Copy Link
Forwarding-loop attacks in content delivery networks - Jianjun Chen, Jian Jiang, Xiaofeng Zheng, Haixin Duan, Jinjin Liang, Kang Li, Tao Wan, Vern Paxson.pdf
PDF
8 years ago
475.48 kB
Copy Link
Side-Channel Leaks in Web Applications_a Reality Today, a Challenge Tomorrow - Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang.pdf
PDF
8 years ago
985.19 kB
Copy Link
Dos and don'ts of client authentication on the Web - Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster.pdf
PDF
8 years ago
135.42 kB
Copy Link
Spot me if you can_Uncovering spoken phrases in encrypted VoIP conversations - Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson, Johns Hopkins University.pdf
PDF
8 years ago
1.13 MB
Copy Link
Detecting DDoS attacks_methods, tools and future directions - Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, J. K. Kalita.pdf
PDF
8 years ago
1.65 MB
Copy Link
Stick worms or responding to a distributed denial of service attack with a selective tarpit - Jordan K. Wiens.pdf
PDF
8 years ago
310.82 kB
Copy Link
Defeating DDoS attacks - Cisco Systems.pdf
PDF
8 years ago
336.90 kB
Copy Link
Traffic analysis_or... encryption is not enough - Carmela Troncoso.pdf
PDF
8 years ago
3.53 MB
Copy Link
DDoS detection based on traffic self-similarity - Delio Brignoli.pdf
PDF
8 years ago
1.18 MB
Copy Link
Truncating TLS Connections to Violate Beliefs in Web Applications - Ben Smyth, Alfredo Pironti, INRIA Paris-Rocquencourt.pdf
PDF
8 years ago
534.91 kB
Copy Link
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks - Ming Li.pdf
PDF
8 years ago
357.22 kB
Copy Link
Why is Internet traffic self-similar - Allen B. Downey. Downey.pdf
PDF
8 years ago
1.26 MB
Copy Link
Analyse spectrale d'outils classiques de DDoS - Laurent Gallon, Julien Aussibal.pdf
PDF
8 years ago
120.69 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.