Sciweavers

741 search results - page 66 / 149
» Tools and techniques for Network Forensics
Sort
View
113
Voted
LISA
2001
15 years 4 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
142
Voted
CCS
2006
ACM
15 years 7 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
135
Voted
ISI
2007
Springer
15 years 9 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
ICN
2009
Springer
15 years 1 months ago
Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide Band
Impulse Radio Ultra Wide Band (IR-UWB) is a promising technology to address Wireless Sensor Network (WSN) constraints. However, existing network simulation tools do not provide a ...
Abdoulaye Berthe, Aubin Lecointre, Daniela Dragomi...
NN
2007
Springer
106views Neural Networks» more  NN 2007»
15 years 3 months ago
Machine learning approach to color constancy
A number of machine learning (ML) techniques have recently been proposed to solve color constancy problem in computer vision. Neural networks (NNs) and support vector regression (...
Vivek Agarwal, Andrei V. Gribok, Mongi A. Abidi