Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Idle scan

The idle scan is a TCP port scan method that consists of sending spoofed packets to a computer to find out what services are available. This is… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Unmanned aerial vehicles (UAVs) can help small-cell base stations (SBSs) offload traffic via wireless backhaul to improve… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Modern DRAM cells are periodically refreshed to prevent data loss due to leakage. Commodity DDR (double data rate) DRAM refreshes… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 7
Is this relevant?
2013
2013
Inefficient use of Java containers is an important source of run-time inefficiencies in large applications. This paper presents… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2012
2012
The spectrum-sliced elastic optical path network (SLICE) architecture has been presented as an efficient solution for flexible… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Internet of Things devices will by and large be battery-operated, but existing application protocols have typically not been… Expand
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table I
Is this relevant?
2010
2010
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address or… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
A large organization, such as a university, commonly supplies computational power through multiple independently administered… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In monetary models in which agents are subject to trading shocks there is typically an ex-post inefficiency in that some agents… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
We consider a wireless network consisting of several active source/destination pairs and several idle nodes. All nodes are… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The declining costs of commodity disk drives is rapidly changing the economics of deploying large amounts of online or near-line… Expand
  • figure 2
  • table 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?