Sciweavers

741 search results - page 63 / 149
» Tools and techniques for Network Forensics
Sort
View
CCS
2010
ACM
13 years 7 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
INFOCOM
2005
IEEE
14 years 2 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
SIGCSE
2000
ACM
119views Education» more  SIGCSE 2000»
14 years 1 months ago
Bugs as features: teaching network protocols through debugging
Being exposed to well-written code is a valuable experience for students -- especially when the code is larger or more complex than they are currently capable of writing. In addit...
Brad Richards
CIBCB
2005
IEEE
14 years 2 months ago
A Neural Network for Predicting Protein Disorder using Amino Acid Hydropathy Values
— Proteins have been discovered to contain ordered regions and disordered regions, where ordered regions have a defined three-dimensional (3D) structure and disordered regions d...
Deborah Stoffer, L. Gwenn Volkert
APN
2005
Springer
13 years 11 months ago
Timed-Arc Petri Nets vs. Networks of Timed Automata
Abstract. We establish mutual translations between the classes of 1safe timed-arc Petri nets (and its extension with testing arcs) and networks of timed automata (and its subclass ...
Jirí Srba