Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,220,491 papers from all fields of science
Search
Sign In
Create Free Account
Wireshark
Known as:
Ethereal (Computer Program)
, Ethereal (software)
, Tshark
Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Capsa Network Analyzer
Comparison of version control software
ControlNet
Cracking of wireless networks
Expand
Broader (1)
Web scraping
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A Testbed for Evaluating Video Streaming Services in LTE
M. Delgado
,
M. Toril
,
I. Palomo
,
G. Gómez
,
J. Poncela-González
Wireless personal communications
2017
Corpus ID: 30905201
With the deployment of the first commercial long term evolution (LTE) networks, mobile operators need to understand how quality…
Expand
2016
2016
LightPcapNg: Implementing a library for general-purpose tracing based on PcapNg
Radu Velea
,
Ioana Apostol
,
V. Patriciu
Symposium on Intelligent Systems and Informatics
2016
Corpus ID: 1470899
The current work analyzes the PcapNg format and presents a new library: LightPcapNg. Its purpose is to provide a lightweight…
Expand
2014
2014
Bluetooth Command and Control channel
H. Pieterse
,
M. Olivier
Computers & security
2014
Corpus ID: 36430724
2013
2013
Performance analysis of VoIP client with integrated encryption module
A. Wahab
,
Rizal Broer Bahaweres
,
M. Alaydrus
,
M. Muhaemin
,
R. Sarno
International Conference on Communications…
2013
Corpus ID: 14009047
The number of VoIP users in Indonesia is very low, although the cost offered by VoIP is smaller than using pulsed phone. One of…
Expand
2011
2011
Security Analysis of Information Systems Taking into Account Social Engineering Attacks
Igor Kotenko
,
M. Stepashkin
,
E. Doynikova
International Euromicro Conference on Parallel…
2011
Corpus ID: 17016982
The paper suggests an attack trees based approach to security analysis of information systems. The approach considers both…
Expand
2011
2011
Pre-Paid Charging System for Sip-P2P Commercial Applications
Damian Nowak
,
K. Walkowiak
2011
Corpus ID: 18103942
The new SIP-P2P approach brings many advantages like the improved reliability and the ease of setup. However, Communications…
Expand
2010
2010
Moving routing protocols to the user space in MANET middleware
P. López
,
Raúl Gracia Tinedo
,
Josep M. Banús Alsina
Journal of Network and Computer Applications
2010
Corpus ID: 16140843
2008
2008
A flexible network monitoring tool based on a data stream management system
Natascha Petry Ligocki
,
Carmem S. Hara
,
C. Lyra
IEEE Symposium on Computers and Communications
2008
Corpus ID: 13888586
Network monitoring is a complex task that generally requires the use of different tools for specific purposes. This paper…
Expand
2007
2007
Digital Still Camera Forensics
Kevin Cohen
2007
Corpus ID: 14862366
In many instances computer forensic practitioners come across digital photographs within an investigation. Examples include law…
Expand
2005
2005
A Taxonomy of free Network Sniffers for teaching and research
Victor A. Clincy
,
Na'el Abu-halaweh
2005
Corpus ID: 8969291
Today's networking environment has become very complex. Networks have been growing in size rapidly and have come to support more…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE