Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,399,339 papers from all fields of science
Search
Sign In
Create Free Account
Wireshark
Known as:
Ethereal (Computer Program)
, Ethereal (software)
, Tshark
Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Capsa Network Analyzer
Comparison of version control software
ControlNet
Cracking of wireless networks
Expand
Broader (1)
Web scraping
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A Testbed for Evaluating Video Streaming Services in LTE
M. Delgado
,
M. Toril
,
I. Palomo
,
G. Gómez
,
J. Poncela-González
Wireless personal communications
2017
Corpus ID: 30905201
With the deployment of the first commercial long term evolution (LTE) networks, mobile operators need to understand how quality…
Expand
2016
2016
LightPcapNg: Implementing a library for general-purpose tracing based on PcapNg
Radu Velea
,
Ioana Apostol
,
V. Patriciu
Symposium on Intelligent Systems and Informatics
2016
Corpus ID: 1470899
The current work analyzes the PcapNg format and presents a new library: LightPcapNg. Its purpose is to provide a lightweight…
Expand
2016
2016
Security intelligence for industrial control systems
A. Amrein
,
V. Angeletti
,
+5 authors
Andreas Wespi
IBM Journal of Research and Development
2016
Corpus ID: 207579807
While there is a broad corpus of security intelligence technologies and solutions for IT (information technology) networks, only…
Expand
Review
2015
Review
2015
Computer network vulnerabilities and monitoring
Adrian Badea
,
V. Croitoru
,
Daniel Gheorghica
International Symposium on Advanced Topics in…
2015
Corpus ID: 27822174
This paper presents an overview of the current computer network vulnerabilities and exploits, possibilities of monitoring the…
Expand
2015
2015
Preserving privacy in secured ZigBee wireless sensor networks
J. Santos
,
Christine Hennebert
,
C. Lauradoux
World Forum on Internet of Things
2015
Corpus ID: 13922196
We expose concretely the information leakage occurring in an IEEE 802.15.4-based ZigBee meshed network. We deploy an IoT platform…
Expand
2012
2012
A Didactic Platform for Testing and Developing Routing Protocols
A. Kaliszan
,
M. Głąbowski
,
S. Hanczewski
International Conference on Telecommunications
2012
Corpus ID: 59431311
This paper presents a platform for testing and the development of new routing protocols. The platform is an alternative to…
Expand
2011
2011
Pre-Paid Charging System for Sip-P2P Commercial Applications
Damian Nowak
,
K. Walkowiak
2011
Corpus ID: 18103942
The new SIP-P2P approach brings many advantages like the improved reliability and the ease of setup. However, Communications…
Expand
2010
2010
Moving routing protocols to the user space in MANET middleware
P. López
,
Raúl Gracia Tinedo
,
Josep M. Banús Alsina
Journal of Network and Computer Applications
2010
Corpus ID: 16140843
2008
2008
A flexible network monitoring tool based on a data stream management system
Natascha Petry Ligocki
,
Carmem S. Hara
,
C. Lyra
IEEE Symposium on Computers and Communications
2008
Corpus ID: 13888586
Network monitoring is a complex task that generally requires the use of different tools for specific purposes. This paper…
Expand
2007
2007
Digital Still Camera Forensics
Kevin Cohen
2007
Corpus ID: 14862366
In many instances computer forensic practitioners come across digital photographs within an investigation. Examples include law…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE