Index of /pdf/Whitepaper/Network/


../
Hole196/                                           07-Nov-2016 21:37                   -
RouterOS/                                          05-Mar-2016 14:27                   -
A Comparative Analysis of TCP Tahoe, Reno, New-..> 21-Jul-2017 20:53               98644
A General Approach to Network Configuration Ana..> 16-Feb-2016 22:12              393426
A glance through the VPN looking glass_IPv6 lea..> 15-May-2016 22:11              775633
A taxonomy of DDoS attack and DDoS defense mech..> 19-Feb-2016 22:33              166818
Analyse spectrale d'outils classiques de DDoS -..> 19-Feb-2016 22:21              123582
Brute forcing Wi-Fi Protected Setup - Stefan Vi..> 26-Dec-2020 22:49              917673
Change trend of averaged Hurst parameter of tra..> 19-Feb-2016 22:35              365797
DDoS detection based on traffic self-similarity..> 19-Feb-2016 22:28             1236089
Defeating DDoS attacks - Cisco Systems.pdf         19-Feb-2016 22:33              344984
Detecting DDoS attacks_methods, tools and futur..> 19-Feb-2016 22:36             1725983
Dos and don'ts of client authentication on the ..> 10-Mar-2016 08:35              138667
Forwarding-loop attacks in content delivery net..> 05-Mar-2016 13:16              486895
Improving multiple file transfers using SCTP mu..> 13-Apr-2016 20:42              308048
Key Reinstallation Attacks: Forcing Nonce Reuse..> 26-Dec-2020 22:40              641650
Multifractal properties of TCP traffic_a numeri..> 19-Feb-2016 22:25              534646
Off-Path TCP Exploits_Global Rate Limit Conside..> 17-Aug-2016 18:44             1527429
On generating self-similar traffic using pseudo..> 19-Feb-2016 22:31               28379
On the self-similar nature of Ethernet traffic ..> 19-Feb-2016 22:24              579148
Opportunities and Limits of Remote Timing Attac..> 26-Dec-2020 22:40              690000
Path loss prediction model for the over‐rooftop..> 26-Dec-2020 22:49              655581
Pozzo & Lucky, the phantom shell_Stego in TCP_I..> 03-Jan-2017 19:58             4515488
Propagation Losses Through Common Building Mate..> 26-Dec-2020 22:49             3064707
Protecting your business against financial and ..> 19-Feb-2016 22:33              818943
Screaming Channels: When Electromagnetic Side C..> 26-Dec-2020 22:40             3983714
SeaGlass: Enabling City-Wide IMSI-Catcher Detec..> 03-Jun-2017 23:19             7925388
Self-similarity through high-variability_statis..> 19-Feb-2016 22:26              609164
Side-Channel Leaks in Web Applications_a Realit..> 28-Aug-2016 12:27             1008835
Spot me if you can_Uncovering spoken phrases in..> 28-Aug-2016 12:13             1185530
Stick worms or responding to a distributed deni..> 16-Feb-2016 23:01              318277
Subscribers remote geolocation and tracking usi..> 09-Jun-2017 21:39             1978463
Teaching an old dog (not that new) tricks_Stego..> 03-Jan-2017 19:56              561237
Traffic analysis_or... encryption is not enough..> 03-Nov-2016 18:55             3705648
Truncating TLS Connections to Violate Beliefs i..> 28-Aug-2016 12:26              547747
Why MAC Address Randomization is not Enough: An..> 26-Dec-2020 22:40              494772
Why is Internet traffic self-similar - Allen B...> 19-Feb-2016 22:23             1323869
Wireless Security Design Overview - Nidal Aboud..> 26-Dec-2020 22:40               75234