To see the other types of publications on this topic, follow the link: WebPosition analyzer (Computer file).

Journal articles on the topic 'WebPosition analyzer (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 15 journal articles for your research on the topic 'WebPosition analyzer (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Narwal, Priti, Deepak Kumar, and Shailendra N. Singh. "A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud." Journal of Cases on Information Technology 21, no. 4 (2019): 14–26. http://dx.doi.org/10.4018/jcit.2019100102.

Full text
Abstract:
Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of t
APA, Harvard, Vancouver, ISO, and other styles
2

Katyayan, Pragya, and Nisheeth Joshi. "Development of Automatic Rule-based Semantic Tagger and Karaka Analyzer for Hindi." ACM Transactions on Asian and Low-Resource Language Information Processing 21, no. 2 (2022): 1–25. http://dx.doi.org/10.1145/3479155.

Full text
Abstract:
Hindi is the third most-spoken language in the world (615 million speakers) and has the fourth highest native speakers (341 million). It is an inflectionally rich and relatively free word-order language with an immense vocabulary set. Despite being such a celebrated language across the globe, very few Natural Language Processing (NLP) applications and tools have been developed to support it computationally. Moreover, most of the existing ones are not efficient enough due to the lack of semantic information (or contextual knowledge). Hindi grammar is based on Paninian grammar and derives most o
APA, Harvard, Vancouver, ISO, and other styles
3

Jawad, Alkenani, and Ahmed Nassari Khulood. "Enhance work for java based network analyzer tool used to analyze network simulator files." Enhance work for java based network analyzer tool used to analyze network simulator files 29, no. 2 (2023): 954–62. https://doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Full text
Abstract:
The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used to calculate performance
APA, Harvard, Vancouver, ISO, and other styles
4

Alkenani, Jawad, and Khulood Ahmed Nassar. "Enhance work for java based network analyzer tool used to analyze network simulator files." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 954. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Full text
Abstract:
<span lang="EN-US">The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used
APA, Harvard, Vancouver, ISO, and other styles
5

Ramos, Rogelio, Roumen Zlatev, Benjamin Valdez, Margarita Stoytcheva, Mónica Carrillo, and Juan-Francisco García. "LabVIEW 2010 Computer Vision Platform Based Virtual Instrument and Its Application for Pitting Corrosion Study." Journal of Analytical Methods in Chemistry 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/193230.

Full text
Abstract:
A virtual instrumentation (VI) system called VI localized corrosion image analyzer (LCIA) based on LabVIEW 2010 was developed allowing rapid automatic and subjective error-free determination of the pits number on large sized corroded specimens. The VI LCIA controls synchronously the digital microscope image taking and its analysis, finally resulting in a map file containing the coordinates of the detected probable pits containing zones on the investigated specimen. The pits area, traverse length, and density are also determined by the VI using binary large objects (blobs) analysis. The resulti
APA, Harvard, Vancouver, ISO, and other styles
6

Astsatryan, Hrachya, Arthur Lalayan, Aram Kocharyan, and Daniel Hagimont. "Performance-efficient Recommendation and Prediction Service for Big Data frameworks focusing on Data Compression and In-memory Data Storage Indicators." Scalable Computing: Practice and Experience 22, no. 4 (2021): 401–12. http://dx.doi.org/10.12694/scpe.v22i4.1945.

Full text
Abstract:
The MapReduce framework manages Big Data sets by splitting the large datasets into a set of distributed blocks and processes them in parallel. Data compression and in-memory file systems are widely used methods in Big Data processing to reduce resource-intensive I/O operations and improve I/O rate correspondingly. The article presents a performance-efficient modular and configurable decision-making robust service relying on data compression and in-memory data storage indicators. The service consists of Recommendation and Prediction modules, predicts the execution time of a given job based on m
APA, Harvard, Vancouver, ISO, and other styles
7

Smiliotopoulos, Christos, Konstantia Barmpatsalou , and Georgios Kambourakis. "Revisiting the Detection of Lateral Movement through Sysmon." Applied Sciences 12, no. 15 (2022): 7746. http://dx.doi.org/10.3390/app12157746.

Full text
Abstract:
This work attempts to answer in a clear way the following key questions regarding the optimal initialization of the Sysmon tool for the identification of Lateral Movement in the MS Windows ecosystem. First, from an expert’s standpoint and with reference to the relevant literature, what are the criteria for determining the possibly optimal initialization features of the Sysmon event monitoring tool, which are also applicable as custom rules within the config.xml configuration file? Second, based on the identified features, how can a functional configuration file, able to identify as many LM var
APA, Harvard, Vancouver, ISO, and other styles
8

Gyimesi, Péter. "Automatic Calculation of Process Metrics and their Bug Prediction Capabilities." Acta Cybernetica 23, no. 2 (2017): 537–59. http://dx.doi.org/10.14232/actacyb.23.2.2017.7.

Full text
Abstract:
Identifying fault-prone code parts is useful for the developers to help reduce the time required for locating bugs. It is usually done by characterizing the already known bugs with certain kinds of metrics and building a predictive model from the data. For the characterization of bugs, software product and process metrics are the most popular ones. The calculation of product metrics is supported by many free and commercial software products. However, tools that are capable of computing process metrics are quite rare. In this study, we present a method of computing software process metrics in a
APA, Harvard, Vancouver, ISO, and other styles
9

Chukwuchekwa, Nkwachukwu, Enwume Joshua U, Longinus S. Ezema, and Cosmas K Agubor. "Investigation of Radio Frequency Licensed Spectrum Utilization in Nigeria: A Study of Rumuokwuta, Port Harcourt, Nigeria." International Journal of Wireless & Mobile Networks 13, no. 05 (2021): 31–41. http://dx.doi.org/10.5121/ijwmn.2021.13503.

Full text
Abstract:
This study was carried out to investigate the spectrum utilization of the licensed Radio Frequency (RF) spectrum in Rumuokwuta, Port Harcourt. An outdoor measurement of spectrum occupancy was carried out in a high-rise building situated at Rumuokwuta urban area in Port Harcourt, Nigeria using RF explorer spectrum analyzer and a personal computer laptop system. Spectrum activities in the band of 240-960 MHz were monitored for 24 hours. The frequency band was subdivided into 24 sub bands each with a span size of 30 MHz. Scanning of bands was made efficient using a python script that scans a rang
APA, Harvard, Vancouver, ISO, and other styles
10

AR, Dinesh, and Dr Pradeep Udupa. "Foreseeing Outbreak Investigation by Means of Machine Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1130–35. http://dx.doi.org/10.22214/ijraset.2023.50250.

Full text
Abstract:
Abstract: The deliberate breach of a security strategy is what intrusion exposure is. In order to look for any malicious actions or extortions, invasion discovery systems monitornetwork traffic passing across numerous types of computer systems and deliver warnings when it perceives any hazards. Systems for identifying extortions should be able to recognize every injurious software and occurrence in the linkage. All forms of occurrences,comprising intrusion, file less malware, botnets, and malware, are changing the threat environment. In order to identify harmful events by investigating the pro
APA, Harvard, Vancouver, ISO, and other styles
11

Mercy, Mbise, and Simba Fatuma. "Performance Evaluation of UDSM Network to Deliver Multimedia eLearning Contents: Case of CoICT." Tanzania Journal of Engineering and Technology 41, no. 4 (2022): 205–18. http://dx.doi.org/10.52339/tjet.v41i4.860.

Full text
Abstract:
The use of technology in education in Sub-Saharan Africa has been reported to be hindered by many factors including inadequate Information and Communication Technology (ICT) infrastructure, low internet speed, and lack of skills to use educational technologies. This paper aim at evaluating how the available ICT infrastructure at the College of Information and Communication Technologies (CoICT) can support, with acceptable Quality of Service (QoS), the delivery of multimedia applications for eLearning services. The evaluation was performed over a network testbed implemented in a computer labora
APA, Harvard, Vancouver, ISO, and other styles
12

Don, Africa, Aaron, and Torrizo, Lorwin Felimar. "Comparative Study of Intrusion Detection Systems against Mainstream Network Sniffing Tools." International Journal of Engineering & Technology 7, no. 4.16 (2018): 188–91. http://dx.doi.org/10.14419/ijet.v7i4.16.22884.

Full text
Abstract:
As the world embraces a technological revolution on how everyday devices are connected to the internet, users provide sensitive information using the internet which is broken down and distributed as packets throughout the network. Packet sniffers tap to these packets, capable of potentially compromising security and privacy of unsuspecting users. This study aims to put into the test some well-known Intrusion Detection Systems (IDS) and observe how they fare against popular packet-sniffing tools such as Wireshark and tcpdump. The varied sniffing methods and techniques from various sniffing tool
APA, Harvard, Vancouver, ISO, and other styles
13

Lipman, Robert. "STEP File Analyzer Software." Journal of Research of the National Institute of Standards and Technology 122 (March 30, 2017). http://dx.doi.org/10.6028/jres.122.016.

Full text
Abstract:
The STEP File Analyzer is a software tool that generates a spreadsheet or a set of CSV (comma-separated value) files from a STEP (ISO 10303 –STandard for Exchange of Product model data) Part 21 file. STEP files are used to represent product and manufacturing information (PMI) and for data exchange and interoperability between Computer-Aided Design (CAD), Manufacturing (CAM), Analysis (CAE), and Inspection (CMM) software related to the smart manufacturing digital thread. STEP is also used for the long-term archiving and retrieval of product data. A spreadsheet simplifies inspecting information
APA, Harvard, Vancouver, ISO, and other styles
14

Ruo, Ando, Kadobayashi Youki, and Takakura Hiroki. "Clustering Massive Packets using a Lock-Free Algorithm of Tree-Based Reduction on GPGPU." April 3, 2021. https://doi.org/10.5281/zenodo.4661457.

Full text
Abstract:
Abstract— Recently, the inspection of huge traffic log is imposing a great burden on security analysts. Unfortunately, there have been few research efforts focusing on scalability in analysing very large PCAP file with reasonable computing resources. In this paper, we present Asura which is a huge PCAP analyzer using A Lock-Free Algorithm of Tree-Based Reduction on GPGPU. Asura’s parallel packet dump inspection is based on task-based decomposition and therefore can handle massive threads for large PCAP file without considering tidy parameter selection in adopting data decomposition
APA, Harvard, Vancouver, ISO, and other styles
15

Kluban, Maryna, Mohammad Mannan, and Amr Youssef. "On Detecting and Measuring Exploitable JavaScript Functions in Real-World Applications." ACM Transactions on Privacy and Security, October 26, 2023. http://dx.doi.org/10.1145/3630253.

Full text
Abstract:
JavaScript is often rated as the most popular programming language for the development of both client-side and server-side applications. Because of its popularity, JavaScript has become a frequent target for attackers who exploit vulnerabilities in the source code to take control over the application. To address these JavaScript security issues, such vulnerabilities must be identified first. Existing studies in vulnerable code detection in JavaScript mostly consider package-level vulnerability tracking and measurements. However, such package-level analysis is largely imprecise as real-world se
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!