×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Network
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Network
/
Parent Folder
Hole196
2 files
RouterOS
6 files
A Comparative Analysis of TCP Tahoe, Reno, New-Reno, SACK and Vegas - unknown.pdf
PDF
7 months ago
Get Size
Copy Link
A General Approach to Network Configuration Analysis - Ari Fogel, Stanley Fung, Luis Pedrosa, Meg Walraed-Sullivan, Ramesh Govindan, Ratul Mahajan, Todd Millstein.pdf
PDF
6 years ago
384.21 kB
Copy Link
A glance through the VPN looking glass_IPv6 leakage and DNS hijacking in commercial VPN clients - Vasile C. Perta, Marco V. Barbera, Gareth Tyson, Hamed Haddadi, Alessandro Mei.pdf
PDF
6 years ago
757.45 kB
Copy Link
A taxonomy of DDoS attack and DDoS defense mechanisms - Jelena Mirkovic, Peter Reiher.pdf
PDF
6 years ago
162.91 kB
Copy Link
Analyse spectrale d'outils classiques de DDoS - Laurent Gallon, Julien Aussibal.pdf
PDF
6 years ago
120.69 kB
Copy Link
Brute forcing Wi-Fi Protected Setup - Stefan Viehböck.pdf
PDF
7 months ago
Get Size
Copy Link
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks - Ming Li.pdf
PDF
6 years ago
357.22 kB
Copy Link
DDoS detection based on traffic self-similarity - Delio Brignoli.pdf
PDF
6 years ago
1.18 MB
Copy Link
Defeating DDoS attacks - Cisco Systems.pdf
PDF
6 years ago
336.90 kB
Copy Link
Detecting DDoS attacks_methods, tools and future directions - Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, J. K. Kalita.pdf
PDF
6 years ago
1.65 MB
Copy Link
Dos and don'ts of client authentication on the Web - Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster.pdf
PDF
6 years ago
135.42 kB
Copy Link
Forwarding-loop attacks in content delivery networks - Jianjun Chen, Jian Jiang, Xiaofeng Zheng, Haixin Duan, Jinjin Liang, Kang Li, Tao Wan, Vern Paxson.pdf
PDF
6 years ago
475.48 kB
Copy Link
Improving multiple file transfers using SCTP multistreaming - Sourabh Ladha, Paul D. Amer.pdf
PDF
6 years ago
300.83 kB
Copy Link
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 - Mathy Vanhoef, Frank Piessens (KU Leuven).pdf
PDF
7 months ago
Get Size
Copy Link
Multifractal properties of TCP traffic_a numerical study - Rudolf H. Riedi, Jacques Lévy Véhel.pdf
PDF
6 years ago
522.12 kB
Copy Link
Off-Path TCP Exploits_Global Rate Limit Considered Dangerous - Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel.pdf
PDF
6 years ago
1.46 MB
Copy Link
On generating self-similar traffic using pseudo-Pareto distribution - unknown.pdf
PDF
6 years ago
27.71 kB
Copy Link
On the self-similar nature of Ethernet traffic - Will E. Leland, Walter Willinger, Bellcore, Murad S. Taqqu, Daniel V. Wilson, Department of Mathematics.pdf
PDF
6 years ago
565.57 kB
Copy Link
Opportunities and Limits of Remote Timing Attacks - Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi (Rice University).pdf
PDF
7 months ago
Get Size
Copy Link
Path loss prediction model for the over‐rooftop propagation environment of microwave band in suburban areas - Naoki Kita, Wataru Yamada, Akio Sato.pdf
PDF
7 months ago
Get Size
Copy Link
Pozzo & Lucky, the phantom shell_Stego in TCP_IP (part 2) - John Torakis.pdf
PDF
6 years ago
4.31 MB
Copy Link
Propagation Losses Through Common Building Materials: 2.4 GHz vs 5 GHz - Robert Wilson (University of Southern California).pdf
PDF
7 months ago
Get Size
Copy Link
Protecting your business against financial and reputational losses with Kaspersky DDoS Protection - Kaspersky Labs.pdf
PDF
6 years ago
799.75 kB
Copy Link
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers - Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon.pdf
PDF
7 months ago
Get Size
Copy Link
SeaGlass: Enabling City-Wide IMSI-Catcher Detection - Peter Ney, Ian Smith, Gabriel Cadamuro, Tadayoshi Kohno.pdf
PDF
7 months ago
Get Size
Copy Link
Self-similarity through high-variability_statistical analysis of Ethernet LAN traffic at the source level - Walter Willinger, Murad S. Taqqu, Robert Sherman, Daniel V. Wilson.pdf
PDF
6 years ago
594.89 kB
Copy Link
Side-Channel Leaks in Web Applications_a Reality Today, a Challenge Tomorrow - Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang.pdf
PDF
6 years ago
985.19 kB
Copy Link
Spot me if you can_Uncovering spoken phrases in encrypted VoIP conversations - Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson, Johns Hopkins University.pdf
PDF
6 years ago
1.13 MB
Copy Link
Stick worms or responding to a distributed denial of service attack with a selective tarpit - Jordan K. Wiens.pdf
PDF
6 years ago
310.82 kB
Copy Link
Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone - Patrick Ventuzelo, Olivier Le Moal, Thomas Coudray (P1 Security).pdf
PDF
7 months ago
1.89 MB
Copy Link
Teaching an old dog (not that new) tricks_Stego in TCP_IP made easy (part 1) - John Torakis.pdf
PDF
6 years ago
548.08 kB
Copy Link
Traffic analysis_or... encryption is not enough - Carmela Troncoso.pdf
PDF
6 years ago
3.53 MB
Copy Link
Truncating TLS Connections to Violate Beliefs in Web Applications - Ben Smyth, Alfredo Pironti, INRIA Paris-Rocquencourt.pdf
PDF
6 years ago
534.91 kB
Copy Link
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms - Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens.pdf
PDF
7 months ago
Get Size
Copy Link
Why is Internet traffic self-similar - Allen B. Downey. Downey.pdf
PDF
6 years ago
1.26 MB
Copy Link
Wireless Security Design Overview - Nidal Aboudagga, Damien Giry, Jean-Jacques Quisquater (UCL Crypto Group).pdf
PDF
7 months ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.