[go: up one dir, main page]

Comer, 2004 - Google Patents

Network processors: programmable technology for building network systems

Comer, 2004

View PDF
Document ID
4321424637036770199
Author
Comer D
Publication year
Publication venue
The Internet Protocol Journal

External Links

Snippet

Engineers who design network systems face the additional challenges of keeping designs scalable, general, and flexible. In particular, because industry trends change rapidly, typical engineering efforts must accommodate changes in requirements during product construction …
Continue reading at wxcafe.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Mallick et al. Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments
Masdari et al. A survey and taxonomy of DoS attacks in cloud computing
Staniford et al. How to own the internet in your spare time
Hachem et al. Botnets: lifecycle and taxonomy
EP2147390B1 (en) Detection of adversaries through collection and correlation of assessments
Wheeler et al. Techniques for cyber attack attribution
US7620733B1 (en) DNS anti-spoofing using UDP
Portokalidis et al. Sweetbait: Zero-hour worm detection and containment using low-and high-interaction honeypots
Young et al. The hacker's handbook: the strategy behind breaking into and defending networks
CN101072106A (en) Method and system for defending against denial of service attacks
Bakr et al. A survey on mitigation techniques against ddos attacks on cloud computing architecture
Hudaib et al. DNS advanced attacks and analysis
CN116471121A (en) Security defense method, gateway proxy device and storage medium
Zang et al. Botnet detection through fine flow classification
Nagesh et al. A survey on denial of service attacks and preclusions
Comer Network processors: programmable technology for building network systems
Carrier et al. The session token protocol for forensics and traceback
Chen et al. An inline detection and prevention framework for distributed denial of service attacks
Foo et al. Mobile agents for computer intrusion detection
Ramamohanarao et al. The curse of ease of access to the internet
Alosaimi et al. Mitigation of distributed denial of service attacks in the cloud
Achi et al. Network security approach for digital forensics analysis
Yoganguina et al. Proposition of a model for securing the neighbor discovery protocol (NDP) in IPv6 environment
CN116192410A (en) Network attack behavior defense method, server and computing equipment
Poonia et al. A Comprehensive Analysis of the Types, Impacts, Prevention, and Mitigation of DDoS Attacks