Sciweavers

7544 search results - page 115 / 1509
» Network Forensics Analysis
Sort
View
COMAD
2009
15 years 4 months ago
Epsilon Equitable Partition: A positional analysis method for large social networks
Positional analysis is considered an important tool in the analysis of social networks. It involves partitioning of the set of actors into subsets such that actors in a subset are...
Kiran Kate, Balaraman Ravindran
ASIASIM
2004
Springer
15 years 8 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
136
Voted
BIOCOMP
2007
15 years 4 months ago
Stability Analysis of Genetic Regulatory Network with Additive Noises
Background: Genetic regulatory networks (GRN) can be described by differential equations with SUM logic which has been found in many natural systems. Identification of the network...
Yufang Jin
CONEXT
2006
ACM
15 years 9 months ago
Investigating the user mobility in wireless mobile networks through real measurements
In this paper is proposed a real mobility characterization study for wireless devices. For this, we use mobility metrics and statistic analysis to evaluate the behavior of device ...
Carlos Alberto V. Campos, Luís Felipe M. de...
CIBCB
2005
IEEE
15 years 9 months ago
Network Motifs, Feedback Loops and the Dynamics of Genetic Regulatory Networks
We analyse a suite of Boolean networks which have been evolved to exhibit limit cycle-type dynamics in terms of the distribution of small network motifs and feedback loops. We find...
Jennifer Hallinan, Paul T. Jackway