Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Port scanner

Known as: IP Scanner, Portsweep, Portscanned 
Port scanner is an application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
The Dendritic Cell Algorithm is an immune-inspired algorithm originally based on the function of natural dendritic cells. The… Expand
  • table 1
  • figure 1
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This book constitutes the joint refereed proceedings of six workshops on evolutionary computing, EvoWorkshops 2004, held together… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This paper presents a family of bitmap algorithms that address the problem of counting the number of distinct header patterns… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both anomaly and misuse detection… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Attackers routinely perform random portscans of IP addresses to find vulnerable servers to compromise. Network intrusion… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Detecting and understanding anomalies in IP networks is an open and ill-defined problem. Toward this end, we have recently… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Portscan detectors in network intrusion detection products are easy to evade. They classify a portscan as more than N distinct… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?