Network analysis

Results: 5019



#Item
721Computing / Software / System software / Computer systems / Network management / Log analysis / Login / Windows Security Log / Logfile / Event Viewer / Password / Windows

Authored by Anton Chuvakin (chuvakin.org) and Lenny Zeltser (zeltser.com). Reviewed by Anand Sastry. Distributed according to the Creative Commons v3 “Attribution” License. Cheat sheet version 1.0. Critical Log Revie

Add to Reading List

Source URL: www.securitywarriorconsulting.com

Language: English - Date: 2010-03-23 02:06:50
722Botnets / Computing / Computer network security / Multi-agent systems / Spamming / Malware / Cyberwarfare / Torpig / Srizbi botnet / Command and control / Festi / Fast flux

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

Add to Reading List

Source URL: seclab.cs.ucsb.edu

Language: English - Date: 2010-12-20 14:49:07
723

Chapter 16 GRAPH MINING APPLICATIONS TO SOCIAL NETWORK ANALYSIS Lei Tang and Huan Liu Computer Science & Engineering Arizona State University

Add to Reading List

Source URL: leitang.net

Language: English - Date: 2010-02-11 13:01:49
    724

    Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis∗ Chuanxiong Guo, Lihua Yuan, Dong Xiang, Yingnong Dang, Ray Huang, Dave Maltz, Zhaoyi Liu, Vin Wang, Bin Pang, Hua Chen, Zhi-Wei L

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2015-07-29 16:54:57
      725

      Workshops Network principles derived from analysis and databasing of cortical connectivity Jan Bjaalie, Claus Hilgetag, Henry Kennedy, Randy McIntosh

      Add to Reading List

      Source URL: neuroinformatics2011.org

      Language: English - Date: 2011-03-18 05:44:06
        726

        Convex Analysis of Generalized Flow Networks Salar Fattahi and Javad Lavaei Department of Electrical Engineering, Columbia University Abstract— This paper is concerned with the generalized network flow (GNF) problem, w

        Add to Reading List

        Source URL: www.ieor.berkeley.edu

        Language: English - Date: 2015-03-18 11:47:56
          727

          Mapping an Emerging National Health Equity Network Findings from a Social Network Analysis of Organizations Serving Asian Americans, Native Hawaiians, and Pacific Islanders AS THE FASTEST GROWING RACIAL GROUP IN

          Add to Reading List

          Source URL: www.spra.com

          Language: English - Date: 2015-03-23 14:03:12
            728

            Network Analysis of Global Politics: Intersectionality and Hypergraphs Annelies Z. Kamran THE CITY UNIVERSITY OF NEW YORK

            Add to Reading List

            Source URL: www.ifr.ac.uk

            Language: English - Date: 2008-07-23 04:15:38
              729Computer networking / Computing / Named data networking / Routing / ICN / Forwarding information base / Computer network / Data transmission

              On the Analysis of Caches with Pending Interest Tables Mostafa Dehghan1 , Bo Jiang1 Ali Dabirmoghaddam2 , Don Towsley1 1

              Add to Reading List

              Source URL: conferences2.sigcomm.org

              Language: English - Date: 2015-10-02 15:24:21
              730Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Command and control / Storm botnet / Cluster analysis / Internet bot / Hierarchical clustering

              BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

              Add to Reading List

              Source URL: faculty.cs.tamu.edu

              Language: English - Date: 2008-05-09 14:43:43
              UPDATE