Sciweavers

741 search results - page 81 / 149
» Tools and techniques for Network Forensics
Sort
View
SIMVIS
2008
13 years 10 months ago
Hybrid Scheduling in the DeVIDE Dataflow Visualisation Environment
Dataflow application builders such as AVS, OpenDX and MeVisLab are popular and effective tools for the rapid prototyping of visualisation algorithms. They enable researchers to bu...
Charl P. Botha, Frits H. Post
MADNES
2005
Springer
14 years 2 months ago
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract ...
Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
ACSAC
2004
IEEE
14 years 20 days ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
VTC
2007
IEEE
161views Communications» more  VTC 2007»
14 years 3 months ago
Early Results on Hydra: A Flexible MAC/PHY Multihop Testbed
— Hydra is a flexible wireless network testbed being developed at UT Austin. Our focus is networks that support multiple wireless hops and where the network, especially the MAC,...
Ketan Mandke, Soon-Hyeok Choi, Gibeom Kim, Robert ...
SOSP
2003
ACM
14 years 5 months ago
User-level internet path diagnosis
Diagnosing faults in the Internet is arduous and time-consuming, in part because the network is composed of diverse components spread across many administrative domains. We consid...
Ratul Mahajan, Neil T. Spring, David Wetherall, Th...