Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,182,829 papers from all fields of science
Search
Sign In
Create Free Account
Packet Storm
Known as:
PacketStorm
, Packetstormsecurity.org
Packet Storm Security is a popular information security website offering current and historical computer security tools, exploits, and security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Computer security
Exploit (computer security)
Outline of computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
How Media Reports Trigger Copycats: An Analysis of the Brewing of the Largest Packet Storm to Date
Vincent Ghiëtte
,
C. Doerr
WTMC@SIGCOMM
2018
Corpus ID: 51927400
In late February 2018, news spread through the mainstream media about a massive distributed denial-of-service attack on the…
Expand
2017
2017
So long, and thanks for only using readily available scripts
Hannes Holm
,
T. Sommestad
Information and Computer Security
2017
Corpus ID: 29823977
Purpose It is often argued that the increased automation and availability of offensive cyber tools has decreased the…
Expand
2015
2015
Converged Packet Transport
White Paper
2015
Corpus ID: 15991224
This white paper summarizes Juniper Networks’ vision for the continuous telecommunications shift from circuit to packet. The…
Expand
2015
2015
Link quality estimation in static wireless networks with high traffic load
A. T. Tran
,
Dinh Duong Mai
,
Myung-Kyun Kim
Journal of Communications and Networks
2015
Corpus ID: 14929043
Effective link quality estimation is a vital issue for reliable routing in wireless networks. This paper studies the performance…
Expand
2012
2012
Video quality degradation on IPTV networks
Jewel Okyere-Benya
,
Mamoon Aldiabat
,
Vlado Menkovski
,
Georgios Exarchakos
,
A. Liotta
International Conference on Computing, Networking…
2012
Corpus ID: 11596954
In IPTV streaming, issues of entire frame losses limit the use of state-of-the-art video quality analyses techniques. We present…
Expand
Review
2007
Review
2007
A Stance On Emulation And Testbeds, And A Survey Of Network Emulators And Testbeds
E. Goektuerk
2007
Corpus ID: 19302222
Emulations and testbeds are popular tools in networking research. However, what differentiates testbeds from emulations is not…
Expand
2007
2007
What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum
S. Bratus
IEEE Security and Privacy
2007
Corpus ID: 15124086
To learn security skills, students and developers must be able to switch from their traditional conditioning to the attacker's…
Expand
2004
2004
The effects of packet reordering in a wireless multimedia environment
C. M. Arthur
,
D. Girma
,
D. Harle
,
Andrew Lehane
1st International Symposium onWireless…
2004
Corpus ID: 28825723
Packet reordering has been shown to be an ever-increasing phenomenon on the Internet and must be taken into account when…
Expand
2002
2002
A Genealogical Approach to Analyzing Post-Mortem Denial of Service Attacks
Gregory W. Rice
,
J. Davis
2002
Corpus ID: 6830046
Availability requires that computer systems remain functioning as expected without loss of resources to legitimate users. The…
Expand
2000
2000
A Storm you Really Need to Weather
Berni Dwan
2000
Corpus ID: 56825027
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE