Sciweavers

741 search results - page 66 / 149
» Tools and techniques for Network Forensics
Sort
View
71
Voted
LISA
2001
15 years 8 days ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
102
Voted
CCS
2006
ACM
15 years 2 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
ISI
2007
Springer
15 years 5 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
87
Voted
ICN
2009
Springer
14 years 8 months ago
Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide Band
Impulse Radio Ultra Wide Band (IR-UWB) is a promising technology to address Wireless Sensor Network (WSN) constraints. However, existing network simulation tools do not provide a ...
Abdoulaye Berthe, Aubin Lecointre, Daniela Dragomi...
87
Voted
NN
2007
Springer
106views Neural Networks» more  NN 2007»
14 years 10 months ago
Machine learning approach to color constancy
A number of machine learning (ML) techniques have recently been proposed to solve color constancy problem in computer vision. Neural networks (NNs) and support vector regression (...
Vivek Agarwal, Andrei V. Gribok, Mongi A. Abidi