Sciweavers

7544 search results - page 56 / 1509
» Network Forensics Analysis
Sort
View
CCS
2007
ACM
15 years 4 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
LISA
2004
14 years 11 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...
CHI
2010
ACM
15 years 4 months ago
ManyNets: an interface for multiple network analysis and visualization
Traditional network analysis tools support analysts in studying a single network. ManyNets offers these analysts a powerful new approach that enables them to work on multiple netw...
Manuel Freire, Catherine Plaisant, Ben Shneiderman...
COMPLEX
2009
Springer
15 years 4 months ago
Comparing Networks from a Data Analysis Perspective
To probe network characteristics, two predominant ways of network comparison are global property statistics and subgraph enumeration. However, they suffer from limited information...
Wei Li, Jing-Yu Yang