Sciweavers

741 search results - page 63 / 149
» Tools and techniques for Network Forensics
Sort
View
122
Voted
CCS
2010
ACM
14 years 10 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
INFOCOM
2005
IEEE
15 years 6 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
111
Voted
SIGCSE
2000
ACM
119views Education» more  SIGCSE 2000»
15 years 5 months ago
Bugs as features: teaching network protocols through debugging
Being exposed to well-written code is a valuable experience for students -- especially when the code is larger or more complex than they are currently capable of writing. In addit...
Brad Richards
92
Voted
CIBCB
2005
IEEE
15 years 6 months ago
A Neural Network for Predicting Protein Disorder using Amino Acid Hydropathy Values
— Proteins have been discovered to contain ordered regions and disordered regions, where ordered regions have a defined three-dimensional (3D) structure and disordered regions d...
Deborah Stoffer, L. Gwenn Volkert
APN
2005
Springer
15 years 2 months ago
Timed-Arc Petri Nets vs. Networks of Timed Automata
Abstract. We establish mutual translations between the classes of 1safe timed-arc Petri nets (and its extension with testing arcs) and networks of timed automata (and its subclass ...
Jirí Srba