Sciweavers

741 search results - page 32 / 149
» Tools and techniques for Network Forensics
Sort
View
JCP
2008
166views more  JCP 2008»
13 years 8 months ago
Water Demand Prediction using Artificial Neural Networks and Support Vector Regression
Computational Intelligence techniques have been proposed as an efficient tool for modeling and forecasting in recent years and in various applications. Water is a basic need and as...
Ishmael S. Msiza, Fulufhelo Vincent Nelwamondo, Ts...
CN
1999
128views more  CN 1999»
13 years 8 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
IJDE
2006
95views more  IJDE 2006»
13 years 8 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
INFOVIS
1995
IEEE
14 years 11 days ago
The information mural: a technique for displaying and navigating large information spaces
Visualizations which depict entire information spaces provide context for navigation and browsing tasks; however, the limited size of the display screen makes creating effective g...
Dean F. Jerding, John T. Stasko
BMCBI
2010
131views more  BMCBI 2010»
13 years 9 months ago
A comparison of approximation techniques for variance-based sensitivity analysis of biochemical reaction systems
Background: Sensitivity analysis is an indispensable tool for the analysis of complex systems. In a recent paper, we have introduced a thermodynamically consistent variance-based ...
Hong-Xuan Zhang, John Goutsias