Sciweavers

741 search results - page 53 / 149
» Tools and techniques for Network Forensics
Sort
View
SIGCOMM
2006
ACM
14 years 2 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
IJNVO
2011
47views more  IJNVO 2011»
13 years 3 months ago
Harvesting covert networks: a case study of the iMiner database
: Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating ...
Nasrullah Memon, Uffe Kock Wiil, Reda Alhajj, Clau...
IDEAL
2007
Springer
14 years 3 months ago
A Framework to Analyze Biclustering Results on Microarray Experiments
Microarray technology produces large amounts of information to be manipulated by analysis methods, such as biclustering algorithms, to extract new knowledge. All-purpose multivaria...
Rodrigo Santamaría, Roberto Therón, ...
DEXAW
2007
IEEE
172views Database» more  DEXAW 2007»
14 years 25 days ago
X-SOM: A Flexible Ontology Mapper
System interoperability is a well known issue, especially for heterogeneous information systems, where ontologybased representations may support automatic and usertransparent inte...
Carlo Curino, Giorgio Orsi, Letizia Tanca
BC
2008
72views more  BC 2008»
13 years 9 months ago
Spike-train spectra and network response functions for non-linear integrate-and-fire neurons
Reduced models have long been used as a tool for the analysis of the complex activity taking place in neurons and their coupled networks. Recent advanced in experimental and theore...
Magnus J. E. Richardson