Network analysis

Results: 5019



#Item
821Security / Software / Industrial automation / SCADA / Telemetry / Computer security / Server / Computer emergency response team / Antivirus software / Technology / Computer network security

Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures Service and tool developed and operated by : AVCaesar

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2014-03-28 18:11:02
822Surveillance / Security / Biometrics / Computer network security / Gait analysis / Orthopedic surgery / Spoofing attack / Gait / Facial recognition system / Locomotion / Medicine / Motion

Can Gait Biometrics be Spoofed?∗ A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietik¨ainen Center for Machine Vision Research, University of Oulu, Finland J. Bustard & M. Nixon School of Electronics and Computer Science

Add to Reading List

Source URL: www.ee.oulu.fi

Language: English - Date: 2012-04-06 05:12:29
823Network management / Internet protocols / Internet standards / System administration / Syslog / Triage / Grep / Log analysis / Find / Computing / Unix / Software

Chapter 4 Initial Triage and Live Response: Data Analysis Solutions in this chapter:

Add to Reading List

Source URL: scitechconnect.elsevier.com

Language: English - Date: 2015-03-19 08:13:59
824Multivariate statistics / Data analysis / Cluster analysis / Singular value decomposition / Graph partition / Spectral clustering / Eigenvalues and eigenvectors / Community structure / Modularity / Statistics / Mathematics / Algebra

A Spectral Clustering Approach to Optimally Combining Numerical Vectors with a Modular Network Motoki Shiga Bioinformatics Center Kyoto University

Add to Reading List

Source URL: www.bic.kyoto-u.ac.jp

Language: English - Date: 2007-06-04 02:24:58
825Science / Structure / Sociology / Complex systems theory / Social information processing / Social network / Cluster analysis / Complex network / Computer network / Network theory / Networks / Statistics

72 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24,

Add to Reading List

Source URL: leitang.net

Language: English - Date: 2012-01-01 18:43:30
826Internet privacy / Network performance / Proxy server / Microsoft SQL Server / Computing / Software optimization / Computer networking

TUM-2097 Project 1: Performance Analysis 1 General Information

Add to Reading List

Source URL: www.net.in.tum.de

Language: English - Date: 2010-10-26 09:13:21
827

Network analysis of the Íslendinga sögur – the Sagas of Icelanders P. Mac Carron & R. Kenna Applied Mathematics Research Centre, Coventry University, Coventry, CV1 5FB, England arXiv:1309.6134v1 [physics.soc-ph] 24 S

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2013-09-24 20:57:30
    828

    Social Network Analysis Study Group (BSA - SNAG) Annual ReportName: Social Network Analysis Study Group (BSA - SNAG) Established: 2006, renewed 2013 Members: 123

    Add to Reading List

    Source URL: www.britsoc.co.uk

    Language: English - Date: 2014-07-07 09:57:40
      829

      CASE STUDY The Crime Analysis Centers’ Data Sharing Network Initiative Helps the State of New York Reduce Crime Customer

      Add to Reading List

      Source URL: www.raytheoncyber.com

      Language: English - Date: 2015-05-29 13:55:09
        830Computer network security / Open Source Tripwire / Computer security / GTK+ / Wireless networking / Rootkit / Wireshark / Pcap / Malware / Software / System software / Computing

        Chapter 10 Analysis of a Suspect Program: Linux Solutions in this chapter:

        Add to Reading List

        Source URL: scitechconnect.elsevier.com

        Language: English - Date: 2015-03-19 08:13:16
        UPDATE