Sciweavers

741 search results - page 66 / 149
» Tools and techniques for Network Forensics
Sort
View
LISA
2001
13 years 10 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
CCS
2006
ACM
14 years 20 days ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
ISI
2007
Springer
14 years 3 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
ICN
2009
Springer
13 years 6 months ago
Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide Band
Impulse Radio Ultra Wide Band (IR-UWB) is a promising technology to address Wireless Sensor Network (WSN) constraints. However, existing network simulation tools do not provide a ...
Abdoulaye Berthe, Aubin Lecointre, Daniela Dragomi...
NN
2007
Springer
106views Neural Networks» more  NN 2007»
13 years 8 months ago
Machine learning approach to color constancy
A number of machine learning (ML) techniques have recently been proposed to solve color constancy problem in computer vision. Neural networks (NNs) and support vector regression (...
Vivek Agarwal, Andrei V. Gribok, Mongi A. Abidi