Sciweavers

2904 search results - page 397 / 581
» Internet Infrastructure Security
Sort
View
JDFP
2008
81views more  JDFP 2008»
15 years 4 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
ISI
2006
Springer
15 years 4 months ago
Content Analysis of Jihadi Extremist Groups' Videos
This paper presents an exploratory study of jihadi extremist groups' videos using content analysis and a multimedia coding tool to explore the types of videos, groups' mo...
Arab Salem, Edna Reid, Hsinchun Chen
TELSYS
2008
98views more  TELSYS 2008»
15 years 4 months ago
Multicast deflector
Abstract Technological evolution is leading telecommunications toward all-IP scenarios, where multiple services are transported as IP packets. Among these services is the broadcast...
António Pinto, Manuel Ricardo
SIGCOMM
2012
ACM
13 years 6 months ago
First insights from a mobile honeypot
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in ...
Matthias Wählisch, Sebastian Trapp, Christian...
WWW
2007
ACM
16 years 4 months ago
Connecting the "bottom of the pyramid": an exploratory case study of india's rural communication environment
This paper is based on our exploratory study of a South Indian village in Chamrajanagar district of Karnataka. The study was to understand the rural communication environment and ...
Sarita Seshagiri, Sagar Aman, Dhaval Joshi