Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,805,753 papers from all fields of science
Search
Sign In
Create Free Account
Nmap Security Scanner
Known as:
Nmap Scripting Engine
, Zenmap
, NmapFE
Expand
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) used to discover hosts…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Babylon
C++
Computer security
Cracking of wireless networks
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
RASMAP: An efficient heuristic application mapping algorithm for network-on-chips
Rasoul Seidipiri
,
A. Patooghy
,
Sima Afsharpour
,
M. Fazeli
Conference on Information and Knowledge…
2016
Corpus ID: 18128528
This paper proposes and evaluates a performance efficient application mapping algorithm for mesh-based NoCs. The proposed…
Expand
2014
2014
Thermal variance-aware application mapping for mesh based network-on-chip design using Kernighan-Lin partitioning
K. Manna
,
Vedic Choubey
,
S. Chattopadhyay
,
I. Sengupta
International Conference on Parallel, Distributed…
2014
Corpus ID: 17334092
This paper presents a Kernighan-Lin bi-partitioning based approach to perform mapping the core graph of an application onto a…
Expand
2014
2014
Security assessment of computer networks -an ethical hacker's perspective
G. Rao
,
P.Naveen Kumar
,
P. Swetha
,
G. Bhanukiran
International Conference on Computing and…
2014
Corpus ID: 17871894
Internet has been used for Critical Infrastructure and E-commerce business activities along with communication. The Information…
Expand
2013
2013
Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework
W. Ghanem
,
B. Belaton
IEEE International Conference on Control System…
2013
Corpus ID: 18680296
The process of detecting running software on remote hosts, is generally known as fingerprinting. Fingerprinting process is…
Expand
2011
2011
The Effect of Electroless Ni Coating of SiC Particles on the Corrosion Behavior of A356 Based Squeeze Cast Composite
B. Dikici
,
Cagri Tekmen
,
M. Gavgali
,
U. Cocen
2011
Corpus ID: 55057681
The corrosion behavior of electroless Ni coated SiC particle reinforced squeeze cast aluminum based composite was investigated by…
Expand
Review
2008
Review
2008
Design and implementation of honeypot systems based on open-source software
Chao-Hsi Yeh
,
Chung-Huang Yang
IEEE International Conference on Intelligence and…
2008
Corpus ID: 7459324
A honeypot is a type of information system that is used to obtain information on intruders in a network. When a honeypot is…
Expand
2008
2008
Rejoinder to the Critiques of the National Mathematics Advisory Panel Final Report
C. Benbow
,
L. Faulkner
2008
Corpus ID: 59335056
The authors respond to comments and criticisms made of Foundations for Success: The Final Report of the National Mathematics…
Expand
2006
2006
A Method of Identify OS Based On TCP/IP Fingerprint
Jian Jiao
2006
Corpus ID: 18123005
Summary This paper present a method that classify the fingerprint of protocol, use the frame to describe the fingerprint in order…
Expand
2005
2005
Application of Support Vector Clustering Algorithm to Network Intrusion Detection
Bao Xu
,
A. Zhang
International Conference on Neural Networks and…
2005
Corpus ID: 11659239
The support vector clustering (SVC) algorithm is inspired from support vector machines (SVM). It takes the form of quadratic…
Expand
Review
1992
Review
1992
Air Force Procedure for Predicting Noise around Airbases: Noise Exposure Model (Noisemap) Technical Report
C. Moulton
1992
Corpus ID: 60036396
Abstract : NOISEMAP was the name given to the original Fortran program, developed for the USAF in the mid 1970's to calculate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE