Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,985,308 papers from all fields of science
Search
Sign In
Create Free Account
Kismet
Known as:
Kismet (program)
Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
BackBox Linux
BackTrack
C++
Cracking of wireless networks
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Jim: A Platform for Affective AI in an Interdisciplinary Setting
Robert Selkowitz
,
Michael C. Heilemann
,
Jon Mrowczynski
AAAI Conference on Artificial Intelligence
2014
Corpus ID: 11299513
We report on Jim, an inexpensive student designed platform for embodied affective AI. The project brings together students from…
Expand
2012
2012
Improving Service Level Management Practices: A Case Study in an IT Service Provider Organization
M. Jäntti
,
Antti Suhonen
IIAI International Conference on Advanced Applied…
2012
Corpus ID: 17025951
The main objective of the Service Level Management process is to ensure that an agreed level of IT service is provided for all…
Expand
2011
2011
A Modular Approach for Intrusion Detection System in Wireless Networks
Tapas Badal
,
Dipti Verma
2011
Corpus ID: 871136
: The increasing reliance upon wireless networks has put tremendous emphasis on wireless network security. Intrusion detection in…
Expand
2009
2009
Self-Validated Behaviour Trees through Reflective Components
David Llansó
,
M. A. Gómez-Martín
,
P. González-Calero
Artificial Intelligence and Interactive Digital…
2009
Corpus ID: 8194061
Developing the AI for non-player characters in a video game is a collaborative task between programmers and designers. Most…
Expand
2009
2009
KISMET: An Open Source Process for Faculty Participation in ABET Accreditation
R. Shankar
,
Ankur Agarwal
2009
Corpus ID: 6516628
A few ABET-experienced faculty members typically guide the ABET documentation process. Consequently, this becomes an abstract…
Expand
2007
2007
How to Cheat at Configuring Open Source Security Tools
M. Gregg
,
Eric S. Seagren
,
A. Orebaugh
,
M. Jonkman
,
R. Marty
2007
Corpus ID: 61479025
2005
2005
Wireless provisioning in hostile RF environments
M. Kershaw
,
K. Keville
Proceedings from the Sixth Annual IEEE SMC…
2005
Corpus ID: 30696331
In this document we propose a new wireless access point (WAP) design, the SmartAP, which provides a high quality and quantity of…
Expand
2004
2004
"IOMaster 7D" - a new device for virtual neuroendoscopy
C. Trantakis
,
J. Meixensberger
,
+6 authors
U. Kühnapfel
Computer Assisted Radiology and Surgery…
2004
Corpus ID: 5129251
2003
2003
Artificial Intelligence: Arrogance or Ignorance?
Computer
2003
Corpus ID: 33144349
Whether the computing profession is ill-informed about natural intelligence or not, there are good arguments for dropping the…
Expand
1978
1978
Strangers No More: All Workers are Entitled to "Just Cause" Protection under Title VII.
A. Blumrosen
1978
Corpus ID: 152623400
The ideal of tort law is reasonable conduct. When reasonable expectations comport with planned undertakings all is well. Tort and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE