Sciweavers

7544 search results - page 79 / 1509
» Network Forensics Analysis
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
APVIS
2001
14 years 11 months ago
Visualisation of Social Networks Using CAVALIER
Social Network Analysis is an approach to analysing organisations focusing on relationships as the most important aspect. In this paper we discuss visualisation techniques for Soc...
Anthony H. Dekker
EUSFLAT
2001
14 years 11 months ago
Criticality analysis in activity networks under incomplete information
A review of the main results obtained by the authors concerning analysis of networks with imprecise activity duration times, with a stress on the analysis of criticality, is prese...
Stefan Chanas, Didier Dubois, Pawel Zielinski
INFOCOM
2012
IEEE
13 years 9 days ago
Extensive analysis and large-scale empirical evaluation of tor bridge discovery
Abstract—Tor is a well-known low-latency anonymous communication system that is able to bypass Internet censorship. However, publicly announced Tor routers are being blocked by v...
Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen ...
ECCV
2004
Springer
15 years 3 months ago
Biometric Sensor Interoperability: A Case Study in Fingerprints
The problem of biometric sensor interoperability has received limited attention in the literature. Most biometric systems operate under the assumption that the data (viz., images) ...
Arun Ross, Anil K. Jain