NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3
zadetkov: 22
1.
  • Design and Implementation o... Design and Implementation of Big-Data Analysis Application on Spark for Distribution Network Based on Data Interception
    Zhang, Pan; Ding, Lingyun; Jiang, Ning ... Energy procedia, October 2018, Letnik: 152
    Journal Article, Conference Proceeding
    Recenzirano
    Odprti dostop

    To prevent automation system database of the distribution network from falsifying and decrease the quantity of the error message records for understanding and evaluating the behaviors of the ...
Celotno besedilo

PDF
2.
  • The Research which Succeed ... The Research which Succeed in Catching the Net Data Pack
    Zhang, Hao; Zhang, Lin Applied Mechanics and Materials, 08/2013, Letnik: 380-384
    Journal Article
    Recenzirano

    Chaperonage network technique of continuously development, make ether net safety problem research more and more importance, involve a network safety the realm have many safety technique, like fire ...
Celotno besedilo
3.
  • Analysis and Research of BP... Analysis and Research of BPF Filter Based on Libpcap
    Yin, Zhi Jian; Zhang, Hao; Liu, Qi Advanced Materials Research, 01/2013, Letnik: 655-657
    Journal Article
    Recenzirano

    this paper analyzes and studies nature of BPF filter based on Libpcap, first of all, it analyzes location and structure of BPF filter in the Linux system kernel; secondly, it gives a detailed ...
Celotno besedilo
4.
  • Analysing Network Traffic and Implementing Diverse Technologies to Examine Different Components of the Network
    Ganesh, Narayanan; Parihar, Arpan Singh; Ghosh, Gourav 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG), 2023-Dec.-8
    Conference Proceeding

    This paper comprehensively explores network traffic analysis using various technologies, focusing on dynamic analysis for malware study with Sandnet as an analysis environment. It investigates DNS ...
Celotno besedilo
5.
  • The Comparison and Verification of Some Efficient Packet Capture and Processing Technologies
    Li, Jiaqian; Wu, Chengrong; Ye, Jiawei ... 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
    Conference Proceeding

    Packet capture technology is the basis for network data analysis and processing. The rapid development of network applications, the speed of network transmission, and the speedy increase in the ...
Celotno besedilo
6.
  • Packet Capture and Protocol Analysis Based on Winpcap
    An Xiaoguang; Lu Xiaofan 2016 International Conference on Robots & Intelligent System (ICRIS), 2016-Aug.
    Conference Proceeding

    In terms of the theories and techniques of network security, packet capture and protocol analysis are a branch of network security protocols, which depend on widely used insecure protocols at the ...
Celotno besedilo
7.
  • Enhancing VNF performance by exploiting SR-IOV and DPDK packet processing acceleration
    Kourtis, Michail-Alexandros; Xilouris, Georgios; Riccobene, Vincenzo ... 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), 11/2015
    Conference Proceeding

    The primary goal of Network Function Virtualization (NFV) is the migration of physical network functions to software versions running on virtual machines (VM) in cloud computing environments. Rapid ...
Celotno besedilo
8.
  • Network Traffic Analysis an... Network Traffic Analysis and Intrusion Detection Using Packet Sniffer
    Qadeer, M.A.; Zahid, M.; Iqbal, A. ... 2010 Second International Conference on Communication Software and Networks, 2010-Feb.
    Conference Proceeding

    Computer software that can intercept and log traffic passing over a digital network or part of a network is better known as packet sniffer. The sniffer captures these packets by setting the NIC card ...
Celotno besedilo
9.
  • Using libPcap for monitorin... Using libPcap for monitoring distributed applications
    Duarte, V; Farruca, N 2010 International Conference on High Performance Computing & Simulation, 2010-June
    Conference Proceeding

    The monitoring of parallel and distributed applications is a common approach for gathering information concerning program execution, for behavioral analysis of the application or of the supporting ...
Celotno besedilo
10.
  • Classification of network t... Classification of network traffic in LAN
    Langthasa, Biswajit; Acharya, Bikash; Sarmah, Satyajit 2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV), 01/2015
    Conference Proceeding

    Classification of Network Traffic is one of most important issue in network management and detection of Intrusion attacks play a vital role in it. To have a holistic picture of the network intrusion ...
Celotno besedilo
1 2 3
zadetkov: 22

Nalaganje filtrov