Comer, 2004 - Google Patents
Network processors: programmable technology for building network systemsComer, 2004
View PDF- Document ID
- 4321424637036770199
- Author
- Comer D
- Publication year
- Publication venue
- The Internet Protocol Journal
External Links
Snippet
Engineers who design network systems face the additional challenges of keeping designs scalable, general, and flexible. In particular, because industry trends change rapidly, typical engineering efforts must accommodate changes in requirements during product construction …
- 238000005516 engineering process 0 title description 13
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mallick et al. | Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments | |
| Masdari et al. | A survey and taxonomy of DoS attacks in cloud computing | |
| Staniford et al. | How to own the internet in your spare time | |
| Hachem et al. | Botnets: lifecycle and taxonomy | |
| EP2147390B1 (en) | Detection of adversaries through collection and correlation of assessments | |
| Wheeler et al. | Techniques for cyber attack attribution | |
| US7620733B1 (en) | DNS anti-spoofing using UDP | |
| Portokalidis et al. | Sweetbait: Zero-hour worm detection and containment using low-and high-interaction honeypots | |
| Young et al. | The hacker's handbook: the strategy behind breaking into and defending networks | |
| CN101072106A (en) | Method and system for defending against denial of service attacks | |
| Bakr et al. | A survey on mitigation techniques against ddos attacks on cloud computing architecture | |
| Hudaib et al. | DNS advanced attacks and analysis | |
| CN116471121A (en) | Security defense method, gateway proxy device and storage medium | |
| Zang et al. | Botnet detection through fine flow classification | |
| Nagesh et al. | A survey on denial of service attacks and preclusions | |
| Comer | Network processors: programmable technology for building network systems | |
| Carrier et al. | The session token protocol for forensics and traceback | |
| Chen et al. | An inline detection and prevention framework for distributed denial of service attacks | |
| Foo et al. | Mobile agents for computer intrusion detection | |
| Ramamohanarao et al. | The curse of ease of access to the internet | |
| Alosaimi et al. | Mitigation of distributed denial of service attacks in the cloud | |
| Achi et al. | Network security approach for digital forensics analysis | |
| Yoganguina et al. | Proposition of a model for securing the neighbor discovery protocol (NDP) in IPv6 environment | |
| CN116192410A (en) | Network attack behavior defense method, server and computing equipment | |
| Poonia et al. | A Comprehensive Analysis of the Types, Impacts, Prevention, and Mitigation of DDoS Attacks |