Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,480,771 papers from all fields of science
Search
Sign In
Create Free Account
Port scanner
Known as:
IP Scanner
, Portsweep
, Portscanned
Expand
Port scanner is an application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Acceptable use policy
Buffer overflow
Computer fraud
Cracking of wireless networks
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Implementation of dendritic cell algorithm as an anomaly detection method for port scanning attack
Silvia Anandita
,
Y. Rosmansyah
,
B. Dabarsyah
,
Jong Uk Choi
International Conference on Information…
2015
Corpus ID: 18550366
One of the problems in the computer security system is port scanning attack. There are several detection systems have been…
Expand
2012
2012
Network Security using Firewall and Cryptographic Authentication
R. Kumar
2012
Corpus ID: 5753008
The network Security is the hottest topic in the current research scenario. The information security is really threatened by…
Expand
2012
2012
Adaptive pattern mining model for early detection of botnet-propagation scale
Do-Hoon Kim
,
Taek Lee
,
Jaewoo Kang
,
Hyunchoel Jeong
,
H. In
Secur. Commun. Networks
2012
Corpus ID: 2614942
Botnets are a disastrous threat because they execute malicious activities such as distributed denial-of-service, spam email…
Expand
2009
2009
Event-Based Input Validation Using Design-by-Contract Patterns
Tugkan Tuglular
,
Can Arda Muftuoglu
,
F. Belli
,
Michael Linschulte
IEEE International Symposium on Software…
2009
Corpus ID: 15067318
This paper proposes an approach for validation of numerical inputs based on graphical user interfaces (GUI) that are modeled and…
Expand
2007
2007
Lightweight Detection of DoS Attacks
S. Pukkawanna
,
V. Visoottiviseth
,
P. Pongpaibool
ICON
2007
Corpus ID: 18040265
Denial of service (DoS) attacks have continued to evolve and impact availability of the Internet infrastructure. Many researchers…
Expand
2006
2006
InetVis, a visual tool for network telescope traffic analysis
J. V. Riel
,
Barry V W Irwin
International Conference on Computer Graphics…
2006
Corpus ID: 9593948
This article illustrates the merits of visual analysis as it presents preliminary findings using InetVis - an animated 3-D…
Expand
2006
2006
Scalable Double Filter Structure for Port Scan Detection
Shijin Kong
,
Tao He
,
Xiaoxin Shao
,
Changqing An
,
Xing Li
IEEE International Conference on Communications
2006
Corpus ID: 19612031
Port scan detection is very important to predict network intrusions and prevent viruses from spreading. Many networks deploy…
Expand
Highly Cited
2005
Highly Cited
2005
IDGraphs: intrusion detection and analysis using histographs
Pin Ren
,
Yan Gao
,
Zhichun Li
,
Yan Chen
,
Benjamin Watson
IEEE Workshop on Visualization for Computer…
2005
Corpus ID: 11765097
Traffic anomalies and attacks are commonplace in today's networks and identifying them rapidly and accurately is critical for…
Expand
2004
2004
Honeypot and scan detection in intrusion detection system
Chunmei Yin
,
Mingchu Li
,
Jianbo Ma
,
Ji-Zhao Sun
Canadian Conference on Electrical and Computer…
2004
Corpus ID: 18776694
We present an application of a honeypot in detection collaboration with an intrusion detection system. We have designed and…
Expand
2004
2004
Traffic Analysis : From Stateful Firewall to Network Intrusion Detection System
F. Guo
,
T. Chiueh
2004
Corpus ID: 1256735
Computer network is already an indispensable part of our mod ern life. To keep our network run smoothly, we need to know its…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE