CORE
🇺🇦
make metadata, not war
Services
Research
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Filters
6 research outputs found
BitProb: Probabilistic Bit Signatures for Accurate Application Identification
Author
Conti Mauro
Hubballi Neminath
Swarnkar Mayank
Publication venue
'Institute of Electrical and Electronics Engineers (IEEE)'
Publication date
01/01/2020
Field of study
No full text
Archivio istituzionale della ricerca - Università di Padova
Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks
Author
A Coates
A Dusia
+18 more
A Hammadi
Anuja Tayal
D Jeswani
J Sommers
J Zhang
L Lu
L Quan
M Cygan
M Mardani
M Steinder
Maitreya Natu
N Duffield
Neha Sharma
Neminath Hubballi
P Gill
SP Kavulya
W Dong
X Guan
Publication venue
'Springer Science and Business Media LLC'
Publication date
Field of study
No full text
Crossref
Slow rate denial of service attacks against HTTP/2 and detection
Author
Adi
Adi
+44 more
Aiello
Aiello
Aiello
Application-Layer DDoS Attacks Are Growing: Three to Watch Out For
Attacking HTTP/2 Implementations
Batthalla
Belshe
Burp Proxy
Cambiaso
Cambiaso
Cambiaso
CVE-2016-1546
Dierks
Dodge
Douligeris
Feinstein
Fielding
Golait
h2load: Benchmarking Tool for HTTP/2 and SPDY Server
HTTP/2: In-depth Analysis of the Top Four Flaws of the Next Generation Web Protocol
Hubballi
jNetPcap
Macia-Fernandez
Mantas
mitmproxy
Mongelli
Neminath Hubballi
Netcraft: September 2016 Web Server Survey
Nikhil Tripathi
O'Reilly
OpenSSL: Cryptography and SSL/TLS Toolkit
OWASP Zed Attack Proxy Project
Park
Peng
scapy-ssl_tls 1.2.2
Tripathi
Tripathi
Turner
Yatagai
Ye
Ye
Ye
Ye
Zargar
Publication venue
'Elsevier BV'
Publication date
Field of study
No full text
Crossref
Application Layer Denial-of-Service Attacks and Defense Mechanisms
Author
Anthony Sebastian
Arkko Jari
+61 more
Ashok India
Barth Bradley
Boulevard Security
Bush Randy
Cao Xiaofan
Ceron João Marcelo
Constantin Lucian
Crispin Mark R.
Daily Kaspersky
Dantas Yuri Gil
de Graaf Kathryn
Dierks Tim
Dowling Benjamin
Droms Ralph
Fielding Roy T.
Gonzalez Hugo
Guo Fanglu
Handley M.
Hub CS
Hubballi Neminath
Intelligence Mordor
Italy Network Security
Kambourakis Georgios
Klensin John C.
Lay
Lewis Dave
Liska Allan
Liu Lin
Mahalanobis Prasanta C.
Malhotra A.
Management Enterprise
Mascarenhas Hyacinth
Mizrahi Tal
Muncaster Phil
NUJP.
O’Leary Rachel Rose
Patrick Michael
Planet Security
Plummer David C.
Postel Jon
Qualys Inc.
Reading DARK
Reo Joy
Reynolds Brennen
Robinson Teri
Rosenberg Jonathan
Schwartz Mathew J.
Shekyan Sergey
Shevtekar Amey
Singh Karanpreet
Singh Khundrakpam Johnson
Sivabalan Sujatha
Storm Packet
Technologies CA
Tools Kali
Tripathi Nikhil
Tripathi Nikhil
Tripathi Nikhil
Vaidyanathan Ravichander
Wang Jin
Wu Yu-Sung
Publication venue
'Association for Computing Machinery (ACM)'
Publication date
Field of study
No full text
Crossref