Sciweavers

741 search results - page 81 / 149
» Tools and techniques for Network Forensics
Sort
View
115
Voted
SIMVIS
2008
15 years 4 months ago
Hybrid Scheduling in the DeVIDE Dataflow Visualisation Environment
Dataflow application builders such as AVS, OpenDX and MeVisLab are popular and effective tools for the rapid prototyping of visualisation algorithms. They enable researchers to bu...
Charl P. Botha, Frits H. Post
141
Voted
MADNES
2005
Springer
15 years 9 months ago
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract ...
Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
111
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
VTC
2007
IEEE
161views Communications» more  VTC 2007»
15 years 9 months ago
Early Results on Hydra: A Flexible MAC/PHY Multihop Testbed
— Hydra is a flexible wireless network testbed being developed at UT Austin. Our focus is networks that support multiple wireless hops and where the network, especially the MAC,...
Ketan Mandke, Soon-Hyeok Choi, Gibeom Kim, Robert ...
107
Voted
SOSP
2003
ACM
16 years 11 days ago
User-level internet path diagnosis
Diagnosing faults in the Internet is arduous and time-consuming, in part because the network is composed of diverse components spread across many administrative domains. We consid...
Ratul Mahajan, Neil T. Spring, David Wetherall, Th...