Science topic
Network Forensics - Science topic
Explore the latest questions and answers in Network Forensics, and find Network Forensics experts.
Questions related to Network Forensics
Check at our new paper on 'MLOps: Automatic, Zero-Touch and Reusable Machine Learning Training and Serving Pipelines' that won the Best paper award at the 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS 2023) held in Bali, Indonesia.
Link to the Published Paper: https://ieeexplore.ieee.org/abstract/document/10346079
ResearchGate Paper Draft Link:
Conference Paper MLOps: Automatic, Zero-Touch and Reusable Machine Learning T...
This work demonstrates how an AI/ML model can be taken to production very easily using components from the Acumos AI project and do much more by creating zero-touch ML model infrastructures using Acumos and Nifi.
I’m planning to investigate number of benign/malicious JavaScript files. I read about various methods for JavaScript code analysis (Static and Dynamic) and I want to use ADSandbox for executing these files.
Conference Paper ADSandbox: sandboxing JavaScript to fight malicious websites
Hi all,
1/ Has any one know how we can generate traffic network (data and attacks )
with TCPDUMP ?
2/ How to import traffic from tcpdump file in OPNET Modeler 14.5 ?
I want to identify when multiple queries arises from same IP address, then I want to analyze which one is legal /illegal that makes traffic over the DNS.
I would like to employ the concept of structural balance which requires signed networks. So far I have been using mainly sna, network, statnet and bipartite R packages, nevertheless it seems that options for signed network analysis are rather limited. I would be especially interested in tools for clustering and blockmodeling of signed networks. (After googling I only found research which uses ERGM (statnet package) for testing of the structural balance hypothesis, nevertheless nothing on mentioned exploratory techniques). Is there R option for signed networks? If not, what other software I should look for?
I have a terabyte of pcap files. I would like to find intrusions in those files. How can I eliminate/reduce unwanted fields or packets in those pcap files ?
Ping flood attack is an attempt to bring down the servers