Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,162,306 papers from all fields of science
Search
Sign In
Create Free Account
Nmap Security Scanner
Known as:
Nmap Scripting Engine
, Zenmap
, NmapFE
Expand
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) used to discover hosts…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Babylon
C++
Computer security
Cracking of wireless networks
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Creating Snort-IDS Rules for Detection Behavior Using Multi-sensors in Private Cloud
Khamkone Sengaphay
,
Saiyan Saiyod
,
N. Benjamas
2016
Corpus ID: 58091930
The private cloud system plays an important role in the present time because it has the ability to adjust to work better based on…
Expand
2014
2014
Thermal variance-aware application mapping for mesh based network-on-chip design using Kernighan-Lin partitioning
K. Manna
,
Vedic Choubey
,
S. Chattopadhyay
,
I. Sengupta
International Conference on Parallel, Distributed…
2014
Corpus ID: 17334092
This paper presents a Kernighan-Lin bi-partitioning based approach to perform mapping the core graph of an application onto a…
Expand
2014
2014
Dynamic & hybrid honeypot model for scalable network monitoring
Kartik Chawda
,
Ankit Patel
International Conference on Information…
2014
Corpus ID: 11666511
Advanced Technology in the area of intrusion detection is the Honeypot technology that unlike common IDS s tends to provide the…
Expand
2014
2014
Security assessment of computer networks -an ethical hacker's perspective
G. Rao
,
P.Naveen Kumar
,
P. Swetha
,
G. Bhanukiran
International Conference on Computing and…
2014
Corpus ID: 17871894
Internet has been used for Critical Infrastructure and E-commerce business activities along with communication. The Information…
Expand
2012
2012
Justice and Development in the Marketplace: Business and Politics in AKP-Era Turkey
Reuben Silverman
2012
Corpus ID: 152350929
2011
2011
The Effect of Electroless Ni Coating of SiC Particles on the Corrosion Behavior of A356 Based Squeeze Cast Composite
B. Dikici
,
Cagri Tekmen
,
M. Gavgali
,
U. Cocen
2011
Corpus ID: 55057681
The corrosion behavior of electroless Ni coated SiC particle reinforced squeeze cast aluminum based composite was investigated by…
Expand
Review
2008
Review
2008
Design and implementation of honeypot systems based on open-source software
Chao-Hsi Yeh
,
Chung-Huang Yang
IEEE International Conference on Intelligence and…
2008
Corpus ID: 7459324
A honeypot is a type of information system that is used to obtain information on intruders in a network. When a honeypot is…
Expand
2008
2008
Rejoinder to the Critiques of the National Mathematics Advisory Panel Final Report
C. Benbow
,
L. Faulkner
2008
Corpus ID: 59335056
The authors respond to comments and criticisms made of Foundations for Success: The Final Report of the National Mathematics…
Expand
2004
2004
A Dynamic Honeypot Design for Intrusion Detection
I. Kuwatly
,
M. Sraj
,
Z. Al Masri
,
H. Artail
The IEEE/ACS International Conference on…
2004
Corpus ID: 47372672
A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the…
Expand
Review
1992
Review
1992
Air Force Procedure for Predicting Noise around Airbases: Noise Exposure Model (Noisemap) Technical Report
C. Moulton
1992
Corpus ID: 60036396
Abstract : NOISEMAP was the name given to the original Fortran program, developed for the USAF in the mid 1970's to calculate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE