Login / Signup
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks.
Stefan Marksteiner
Harald Lernbeiß
Bernhard Jandl-Scherf
Published in:
SafeConfig@CCS (2016)
Keyphrases
</>
computer networks
network security
communication networks
network management
computer systems
intrusion detection system
network traffic
image processing
security problems
scan data
database
computer networking
computer network security
real world
information retrieval
network monitoring