lecture-notes 45
- Non-oblivious Algorithms
- Oblivious Algorithms
- Distributed Networking
- Work-stealing
- Performance Modelling
- Network Architecture Topologies
- Designing Locks
- Locks
- Memory Models
- Cache coherence
- Caches
- MPI
- CUDA
- Intro to Parallel Architectures
- Congestion Control
- QUIC
- Transport Protocols
- Network Security
- Inference
- Network Measurements
- Network Synthesis
- Network Verification
- Fast convergence - MPLS
- Prefix filtering and aggregation
- Hierarchical routing
- ATCN Exam Questions
- DPHPC Exam Questions
- RETbleed
- Meltdown: Reading Kernel Memory from User Space - Paper Summary
- Spectre Attacks: Exploiting Speculative Execution - Paper Summary
- Transient Execution Attacks and Defences
- Breaking ASLR
- CPU Caches
- Virtual Private Networks
- SSL/TLS Public-Key Infrastructure
- SCION
- IPv6
- Firewalls
- DNS Security
- DDoS
- Botnets and IoT
- BGP Security
- Anonymous Communication Systems
- TLS
- Crypto refresher