Nmap Security Scanner

Known as: Nmap Scripting Engine, Zenmap, NmapFE 
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) used to discover hosts… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1999-2018
051019992018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper presents a case study in an attempt to raise awareness on computer security. Our research showed that theoretically… (More)
  • figure 1
  • figure 3
  • figure 2
Is this relevant?
2013
2013
Heterogeneous architectures have emerged to combine 2D routers and 3D routers in NoCs producing 3D NoCs with lower area and power… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Computer Network and Internet is growing every day. Computer networks allow communicating faster than any other facilities. These… (More)
  • figure 1
  • figure 3
Is this relevant?
2010
2010
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
In this paper, a SOM-based anomaly intrusion detection system is proposed, which can contract high-dimension data to lower… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2006
2006
Fresh-cut cantaloupe cubes were placed in film-sealed containers in which the internal gas mixture was attained naturally (nMAP… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Network-on-chip (NoC) has been proposed as a solution for the global communication challenges of System-on-chip (SoC) design in… (More)
  • figure 2
  • figure 6
  • figure 7
  • table 1
  • figure 8
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We address the design of complex monolithic systems, where processing cores generate and consume a varying and large amount of… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
BACKGROUND Health care is entering the Information Society. It is evident that the use of modern information and communication… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Design: We introduced a computer-based nursing documentation system on four wards of the University Hospitals of Heidelberg and… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?