Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

WinPcap

Known as: .pcap, Libpcap, PCAP 
In the field of computer network administration, pcap (packet capture) consists of an application programming interface (API) for capturing network… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The number of cyber threats is constantly increasing. In 2013, 200,000 malicious tools were identified each day by antivirus… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Keywords: BitTorrent Sync Peer-to-Peer Synchronisation Privacy Digital forensics abstract With professional and home Internet… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Any assessment of classification techniques requires data. This document describes sets of data intended to aid in the assessment… Expand
  • figure 1
  • table 1
  • table 2
Is this relevant?
2013
2013
ARM-based servers are garnering increasing interest in big data processing for their low power consumption. However, they are ill… Expand
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table IV
Is this relevant?
Highly Cited
2012
Highly Cited
2012
  • L. Rizzo
  • USENIX Annual Technical Conference
  • 2012
  • Corpus ID: 2908821
Many applications (routers, traffic monitors, firewalls, etc.) need to send and receive packets at line rate even on very fast… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Internet traffic measurement and analysis has long been used to characterize network usage and user behaviors, but faces the… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Underwater acoustic sensor networks can be employed by a vast range of applications, retrieving accurate and up-to-date… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The volume and complexity of traffic on the Internet is increasing rapidly, making it both more difficult and more important to… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The performance of signature-based network intrusion detection tools is dominated by the string matching of packets against many… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?