You are here: Home > Publications > RIPE Labs
RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

80 items matching your search terms
11
The Biometrics and Internet Security Research Group at the University Darmstadt is conducting a survey on network attack detection and mitigation in order to ...
12
ENISA, the European Union Agency for Network & Information Security, is an independent body of expertise, set up by the European Union, to secure Europe’s ...
13
Page - On RIPE Labs
Internet of Things (IoT) emerged as a complex cyber-physical system that allows smart devices to sense the environment and modify it accordingly to enhance the ...
14
We are at a very important decision point in Internet history. Will we accept insecure and unsafe Internet of Things (IoT) devices that erode our privacy and ...
15
Last week we improved the security of our routing infrastructure by implementing RPKI (Resource Public Key Infrastructure), a technology that can be used to ...
16
The current perspective on cyber security is still dominated by the technical nature of many security issues. Within the technical community there is consensus ...
17
We wanted to find out what network security experts think about network anomalies. We created a short web survey in order to map opinions of network ...
18
In this post (originally published on the APNIC blog), Cengiz Alaettinoglou gives a brief overview and comparison of the IRR and SIDR security models and ...
19
As many in the tech community will know, the DNS is a core part of the Internet’s infrastructure. It provides the vital function of mapping human-readable ...
20
Network-based attacks pose a strong threat to the Internet landscape. In my PhD I am investigating different approaches on attack mitigation and response. Yet, ...
80 items matching your search terms