Sciweavers

2912 search results - page 257 / 583
» Overlay Networks - Implementation by Specification
Sort
View
VIZSEC
2004
Springer
15 years 9 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
BMCBI
2010
164views more  BMCBI 2010»
15 years 4 months ago
Flexible network reconstruction from relational databases with Cytoscape and CytoSQL
Background: Molecular interaction networks can be efficiently studied using network visualization software such as Cytoscape. The relevant nodes, edges and their attributes can be...
Kris Laukens, Jens Hollunder, Thanh Hai Dang, Geer...
CORR
2011
Springer
183views Education» more  CORR 2011»
14 years 11 months ago
Automatic Network Fingerprinting through Single-Node Motifs
Complex networks have been characterised by their specific connectivity patterns (network motifs), but their building blocks can also be identified and described by node-motifs—...
Christoph Echtermeyer, Luciano da Fontoura Costa, ...
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
WebProfiles: A Negotiation Model for User Awareness in Personal Area Networks
Automatic adaptation of the environment to user preferences results in personalized ambients that fulfill user interaction requirements in a more suitable way. However, the proble...
Juan Ignacio Vázquez, Diego López de...
CORR
2006
Springer
78views Education» more  CORR 2006»
15 years 4 months ago
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
FLAIM (Framework for Log Anonymization and Information Management) addresses two important needs not well addressed by current log anonymizers. First, it is extremely modular and ...
Adam J. Slagell, Kiran Lakkaraju, Katherine Luo