Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Nmap Security Scanner

Known as: Nmap Scripting Engine, Zenmap, NmapFE 
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) used to discover hosts… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A challenge facing industrial control network administrators is protecting the typically large number of connected assets for… Expand
  • table I
  • figure 1
  • table II
  • table III
Is this relevant?
2012
2012
Evolution in cloud services and infrastructure has been constantly reshaping the way we conduct business and provide services in… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The purpose of this study was to determine the effects of an early numeracy preventative Tier 2 intervention on the mathematics… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both anomaly and misuse detection… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Network-on-chip (NoC) has been proposed as a solution for the global communication challenges of system-on-chip (SoC) design in… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We address the design of complex monolithic systems, where processing cores generate and consume a varying and large amount of… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
2004
2004
Modern technology in the area of intrusion detection is honeypot technology that, unlike common IDSs, tends to provide the… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2004
2004
A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?