Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    683 knime pcap jobs found

    I am pursuing a turnkey IMSI-catcher solution that combines purpose-built hardware with companion software. The foremost requirement is solid, real-time Call and SMS interception; ...and export features. 3. Complete technical documentation: RF design files, firmware, build instructions and operator manual. Acceptance criteria • Intercepts at least 90 % of unencrypted calls and SMS within a 100 m radius in urban conditions. • Switches bands in under 2 s without losing an active target. • Location accuracy ≤ 5 m in open field tests. • All logs export correctly to CSV/PCAP without data loss. If you can engineer both the RF side and the software workflow to meet these thresholds, I look forward to moving ahead rapidly and will share additional protocol...

    $7951 Average bid
    $7951 Avg Bid
    33 bids

    ...exchanged with the server is preserved for later inspection. The emphasis is on strategy: tight quest routing, efficient mob clears, perfect skill rotations and any time-saving tricks that shave minutes off the clock. Its a leveling speedrun, without buying things with diamonds. can use multiple characters, team, powerleveling, but need to capture all the workflow packets. Deliverables • .pcap files recorded from log-in to final level-up (can be split across multiple sessions) • A brief run log for each class that notes quest order, grinding locations, key resource spends and any anomalies seen in the traffic capture • Final completion times so I can benchmark future attempts Packet captures have to be clean (no missing segments), and the run notes must be...

    $200 Average bid
    $200 Avg Bid
    2 bids

    I need real-time, screen-share guidance on Google Meet to get a brand-new Twilio Elastic SIP Trunk talking cleanly with my existing 3CX system so we can place and receive phone...Elastic SIP Trunk fully configured with credentials and phone number • 3CX trunk registered and showing “green” status • Successful inbound and outbound call tests with clear audio • Quick written recap of key settings so I can repeat or edit them later Please be comfortable navigating Twilio’s trunking dashboard, 3CX (cloud or on-prem), and typical VoIP troubleshooting tools like SIP logs, pcap captures, or Wireshark in case we hit a snag. The session can happen as soon as we coordinate calendars—plan for about an hour, though I’m happy to reserve extra...

    $97 Average bid
    Featured
    $97 Avg Bid
    4 bids

    ...also want a small tool that lets me pipe raw pcap streams into the training set so the system can learn my network's quirks. Second, build and train the detection engine: a well-commented Python project that leverages scapy, pandas, and the scikit-learn implementation of Random Forest, which is my preferred choice for its balance of performance and interpretability. Third, wrap the model in a daemon that watches the interface, raises an alert (syslog plus a webhook) when an attack pattern is scored above the chosen threshold, and writes a short JSON report for later forensics. Deliverables Source code and Trained Random Forest model file and reproducible training script Small CLI utility to feed live or recorded pcap into the detector README that explains setup

    $121 Average bid
    $121 Avg Bid
    39 bids

    ...proof-of-concept framework that ingests live and historic network traffic logs, learns from them in near-real time, and flags malicious patterns before they escalate. The core must combine traditional threat-intel techniques with machine-learning pipelines so the system continuously adapts as new data arrives. Here’s what success looks like to me: • A modular data-collection layer that can stream pcap, NetFlow, or similar log formats into a preprocessing engine. • Feature-engineering and model-training code written in Python (feel free to leverage Pandas, scikit-learn, TensorFlow, PyTorch—whatever best suits the task). • A detection component that scores incoming traffic and raises alerts via a simple REST API or CLI output. • Clear docu...

    $8394 Average bid
    $8394 Avg Bid
    16 bids

    ...reception. - Implement UDP TX using LWIP for sending data over UDP with configurable IP and port. - Handle large frames by sending in single datagram or using fragmentation protocol (frame_id, chunk_index, total_chunks, crc) for payloads around 10KB. - Optional: forward NMEA data on a separate UDP port. - Deliver complete CubeIDE project and documentation. - Test and verify UDP reception with log/pcap/wireshark or video to prove valid frame transmission. Additional information I’ll accept delivery after hardware tests provide clear proof of correct UDP reception and valid frames. Please ensure all work aligns with the acceptance criteria mentioned. Platform STM32 Developer expertise Firmware development, Microcontrollers, Networking, Testing Ideal candidate Skills a...

    $187 Average bid
    $187 Avg Bid
    52 bids

    I need practical, one-on-one help building a complete machine-learning workflow in KNIME that takes raw text and ends with a reliable classification model. I already have sample text data ready and a basic familiarity with the interface. This is some of the scope of work Scope of Work -Review and understand dataset -Data cleaning, preparation, and feature engineering in KNIME -Build and configure the logistic regression workflow -Evaluate model performance and refine as needed -Translate model outputs into stocking recommendations -Walk through the entire workflow step‑by‑step -Provide a final KNIME workflow file and documentation If you’re experienced in KNIME’s text-processing extension and classification nodes and can explain concepts in simple term...

    $22 Average bid
    $22 Avg Bid
    16 bids

    ...include complete source code or reproducible build artifacts, a clear installation and deployment guide suitable for a junior administrator, and a quick-start operational playbook demonstrating how baseline learning is verified, how to trigger a test scan or anomaly, and how to confirm alerts via logs, email, and dashboard. Acceptance testing will include deployment in a lab environment, replay of PCAP traffic, verification that the defined behaviors are detected, confirmation of low false-positive rates, and validation of alert delivery across all channels. Due to compliance with United States export control, financial, and data protection regulations, we are only considering candidates based in countries aligned with U.S. regulatory frameworks. This includes, but is not limite...

    $794 Average bid
    $794 Avg Bid
    89 bids

    ...issues • Need correct final configuration on: o FreePBX (GUI and Asterisk level) o ElevenLabs dashboard Required Skills (DO NOT APPLY WITHOUT THESE) • Experience with Asterisk and FreePBX • Deep PJSIP knowledge (endpoint, AOR, auth, identify) • SIP trunking with cloud AI / voice bots • RTP, NAT, and audio troubleshooting • AWS networking and security groups • Ability to read SIP traces, tcpdump, and pcap files • Twilio SIP and PSTN routing (strong bonus) Deliverables • Fully working PBX,ElevenLabs SIP integration • Both scenarios tested and confirmed • Final documentation covering: o SIP trunk configuration o Dialplan and call flow logic o ElevenLabs settings Optional (Nice to Have) • Security hardening and best-practi...

    $141 Average bid
    $141 Avg Bid
    19 bids

    Hello, I need someone to complete a small networking project for me. Please read the details carefully. PROJECT TITLE: DDo...“skerdi.340” in the path. If you create a PowerPoint title slide (optional), include: “Project by Skerdi (skerdi.340)” REQUIRED SCREENSHOTS: Please provide high-quality screenshots of: Normal ping test SYN flood running in terminal UDP flood running ICMP flood running Wireshark live capture IO Graph (packet spike) Protocol Hierarchy Conversations Summary of capture DELIVERABLES: All PCAP files A folder of screenshots (all named starting with skerdi.340_) Any notes describing what you did (optional) I do not need you to write the report. I will write the final report myself. Please send me your price and your estimated...

    $156 Average bid
    $156 Avg Bid
    19 bids

    ...project must be fully reproducible by me by following your instructions. Payment: $10 per fully completed, approved project. ⸻ Project Types Needed (8–12 Total) SOC / SIEM Projects (3–4) • Analyze malicious login attempts • Investigate suspicious process activity • Parse logs inside a SIEM (Chronicle, Splunk, Elastic, etc.) • Build an incident report Network Security Projects (2–3) • Analyze PCAP files in Wireshark • Identify command-and-control traffic • Detect port scans • Write a Tier-1 analyst style summary Linux + Forensics Projects (2) • Investigate user activity • Parse authentication logs • Collect basic indicators of compromise Vulnerability Projects (1–2) • Run a safe ...

    $20 Average bid
    $20 Avg Bid
    13 bids

    ...Detection Module: Use LSTM Autoencoder (unsupervised) or any efficient deep learning algorithm for DDoS anomaly detection. Optionally integrate Federated Learning (FedAvg) across RSUs/OBUs to simulate distributed learning without sharing raw data. Use datasets like CIC-DDoS2019, CIC-IDS2017, or CAIDA DDoS dataset for training and evaluation. Implement feature extraction (e.g., via CICFlowMeter or pcap analysis). 2. Mitigation Module: Build an SDN controller app (Ryu or ONOS) that enforces mitigation (drop rules, rate limiting, rerouting) dynamically. Integrate Reinforcement Learning (RL) (DQN/PPO) at controller level to automate mitigation decision-making. 3. Simulation / Environment Setup: Integrate with Mininet and/or Veins (OMNeT++ + SUMO) for VANET simulation. Gener...

    $183 Average bid
    $183 Avg Bid
    6 bids

    ...time. Your Python tooling should pull JA4 and JA4-H fingerprints, but also go beyond TLS by recognising QUIC, DNS, and SMB/CIFS flows, then correlate them so I can see how one sample behaves across protocols in a single timeline. Core deliverables • A repeatable VMware configuration script or template, with isolation controls clearly documented • Python modules (CLI-driven) that:  – ingest pcap or live interface traffic  – extract JA4/JA4-H, DNS RR data, QUIC version info, and SMB/CIFS command sequences  – write results to JSON and a lightweight SQLite DB for easy querying • Demonstration: run two known C2 samples, show captured traffic, generated fingerprints, and cross-protocol correlation output • Clear setup ...

    $59 / hr Average bid
    $59 / hr Avg Bid
    26 bids

    ...cipher such as AES-128/256. Scope (basic, proof-of-concept level): • Hook into the existing capture routine (built with libpcap / WinPcap) and encrypt each packet buffer before it is saved or forwarded. • Keep metadata (timestamp, interface, length) intact so the file can still be read back after decryption. • Supply a minimal decrypt routine that reverses the process and restores a standard .pcap file. Deliverables: 1. Well-commented source code or a lightweight plugin that compiles on Windows (VS / MinGW) or runs in Python 3. 2. A short README showing how to build, run, encrypt, and decrypt. 3. A demo capture (≤1 MB) proving the workflow. I’m only looking for freelancers who have hands-on experience with Wireshark, packet capture librari...

    $161 Average bid
    $161 Avg Bid
    39 bids

    ...client to close the connection, and adapt the stub (or apply a temporary hook) so the client completes the login flow and enters the lobby in our test environment. What we already have: The client runs standalone (launcher dependency removed). Several Python stubs for testing (modes: hello-only; hello→blob; 8-byte hello; hello + delayed second packet; passive receive-only stub). Network captures (PCAP/PCAPNG) and TCP stream hex exports showing the observed handshake (08 00 43 01 from client → 08 00 43 02 from stub → large blob 05 DC 43 03 ... that currently triggers a close). Partial memdumps and binary dumps of the recv buffer (example base ~0x18B10008, observed length 0x05DC) and a small dump showing BAADF00D markers. Debug artifacts: register dumps, stack ...

    $453 Average bid
    $453 Avg Bid
    70 bids

    I’m competing in a Capture-the-Flag event that centers on network security, and I’m stalled on a packet-analysis challenge. I already have the .pcap files; I just need an expert who can load them into Wireshark, dissect the traffic, and lead me straight to the flag. What I need from you: • Open and analyze the provided captures exclusively in Wireshark. • Extract and document the flag(s) or required answers. • Supply a concise, step-by-step write-up explaining filters, protocols examined, and any reconstruction techniques so I can learn from your approach. No firewall tuning or IDS configuration is involved—this task is purely packet analysis. You should be comfortable with TCP/IP fundamentals, stream reassembly, protocol carving, and the usual...

    $6 / hr Average bid
    $6 / hr Avg Bid
    11 bids

    ...detection, and vulnerability scanning. Wireshark is the only tool explicitly required by the brief, though you are free to employ any additional utilities you prefer as long as they do not conflict with university policy. Deliverables • For each of the 38 pending questions: the correct flag and a concise explanation of the steps used to obtain it (commands, reasoning, and any screenshots or pcap snippets, if relevant). • A short summary at the end outlining common techniques or patterns you observed across the challenges. Everything must be your own work and ready for submission in a clear, editable document or markdown file. If you can move quickly and accurately through typical CTF networking puzzles, this should feel straightforward. I will review your write...

    $7 / hr Average bid
    $7 / hr Avg Bid
    10 bids

    ...example, an Authorization: Bearer eyJ… header or a token embedded in a JSON payload). The capture must: • come from the current public Waymo Rider app (Android or iOS) • include clear timestamps, request/response headers, and bodies where the token appears • remain unaltered and un-redacted (except for your own personal data, which you may mask) Deliverables 1. Raw capture file (.har, .pcap, or equivalent) 2. A brief markdown or text note explaining: – device/OS and app version used – proxy or capture tool, plus any SSL-pinning bypass method applied – the exact request(s) where the JWT is visible (timestamp + endpoint) Once I can open the file and see the token in context, the job is done. If this first pha...

    $161 Average bid
    $161 Avg Bid
    45 bids

    ...Scope of work • Set up or refine existing SIEM and packet-capture feeds (e.g., Splunk, Elastic, Zeek, Suricata) to ensure full network visibility. • Create and tune detection rules, correlation searches, and alerts that focus on phishing indicators—DNS anomalies, unusual SMTP flows, look-alike domains, and malicious URLs. • Conduct end-to-end incident triage: verify alerts, gather evidence (pcap, logs, threat-intel hits), determine impact, and recommend containment steps. • Deliver a detailed analysis report for each confirmed incident, including timeline, root cause, IOCs, MITRE ATT&CK mapping, and actionable remediation advice. • Provide a concise daily dashboard summary plus a weekly deep-dive overview so leadership can track trends a...

    $233 Average bid
    $233 Avg Bid
    24 bids

    ...() 1 screen recording, 30–90 seconds () Network capture (PCAP file or exported HTTP/JSON flows if possible) ( or ) Asap Android apps / tools for capturing app activity Tool / App What it can capture Platform Approx. Cost Notes HttpCanary On-device HTTP/HTTPS capture (with JSON/HTTP bodies if cert installed), export flows Android Free + Pro (~$5–$30) Works directly on phone, easy to use Packet Capture (Grey Shirts) Raw network traffic (PCAP) via local VPN, limited decryption Android Free / donation No root needed, bodies may be encrypted tcpdump (via Termux or rooted phone) Raw PCAP packets Android Free Needs root or running through gateway Wireshark Analyze PCAPs on PC Windows/macOS/Linux

    $137 Average bid
    $137 Avg Bid
    105 bids

    ...ready for an upcoming mixed-format Capture The Flag event that blends classic Jeopardy-style puzzles with live attack-defence rounds. To compete at the top of the scoreboard, I’m looking for someone who already lives and breathes CTFs and can step in as both mentor and problem-solver. You should feel at home reversing binaries, breaking crypto, dissecting web apps, and pulling hidden artefacts from pcap dumps—essentially the full range of challenges that show up in a well-designed CTF. I’ll share individual tasks as they drop; in return, I’ll need concise write-ups, working exploits or scripts, and a quick walkthrough of the thought-process so I can learn as we go. If you’ve racked up points on platforms like Hack The Box, picoCTF or DEF CON Quals,...

    $20 Average bid
    $20 Avg Bid
    6 bids

    ...environment, how one-time passwords sent over a mobile network can be intercepted and read. The goal is pure security testing. You will configure the necessary signaling access, execute the interception of a sample OTP SMS routed through the target mobile operator, and document every step so I can reproduce the process internally. The final package should include: • a short proof-of-concept video or pcap showing the captured OTP, • a technical walkthrough describing the SS7 messages used, attack path, and required network conditions, and • remediation recommendations that the operator can implement immediately. Please outline the SS7 gateways, HLR/MSC probes, or any specific toolsets you prefer to use (e.g., SigPloit, Wireshark with SS7 plugins, custom scri...

    $722 Average bid
    $722 Avg Bid
    15 bids

    ...A lightweight asset & data-flow inventory, prioritised by business impact, so our responders know where to focus first. • A briefing deck or quick-reference sheet that the SOC can use for tabletop exercises, illustrating how your detection and analysis steps fulfil the stated learning outcomes. Acceptance criteria 1. Editable source files (DOCX/Markdown) plus polished PDFs. 2. Wireshark .pcap evidence and a short narrated screencast (<10 min) walking through key detection moments. 3. Each recommendation tied to at least one recognised framework or reference (MITRE ATT&CK, OWASP, NIST). 4. Material ready for an internal tabletop test without further re-work. If this aligns with your skills, send me a brief outline of your approach and timeline so we can...

    $18 Average bid
    $18 Avg Bid
    7 bids

    ...CICIDS 2018 dataset into a real-time Network Intrusion Detection System that flags anomalies in packet-level traffic. The part I still need is the heart of the system: a well-architected Convolutional Neural Network, trained and tuned so that it can keep pace with live throughput and later be ported to an FPGA. Here is what I expect to walk away with: • Clean, reproducible preprocessing of raw pcap files into tensors suited for a CNN, with all scripts delivered. • A CNN architecture (TensorFlow/Keras or PyTorch) that zeroes in on traffic pattern anomalies rather than signature-based classes. • Training routines, hyper-parameter sweeps, and clear evaluation metrics (accuracy, recall, F1, ROC-AUC) on the official CICIDS 2018 train/test split. • Inference...

    $20 / hr Average bid
    $20 / hr Avg Bid
    36 bids

    I’m putting together two self-contained machine-learning pipelines and would like a specialist to handle every step from raw data through to actionable results. 1. Binary DNN for network traffic The goal is to flag traffic as malicious or safe. I have access to common sources such as PCAP dumps, flow records and log exports, and can provide whichever format you prefer. You’ll decide on the most suitable feature-extraction strategy, build the deep-neural network in TensorFlow/Keras (or PyTorch if you have a strong preference), train it, and document precision, recall and ROC-AUC. Please add at least five sample predictions with explanations and finish with a concise set of ideas on how we could push performance further (e.g., alternative architectures, data augmentatio...

    $219 Average bid
    $219 Avg Bid
    51 bids

    I’m building a small web-based tool that lets finance staff reconcile bank activity directly from our existing WordPress site while a KNIME workflow does the heavy lifting behind the scenes. From the user’s point of view it should feel like a simple WordPress page: they upload or fetch the latest statements, press “Reconcile”, and within seconds receive a clear report. Under the hood KNIME will process the data, apply configurable matching rules, and push the results back to WordPress for download or on-screen review. Core workflow • Transaction matching across checking, savings and corporate credit-card accounts • A rules engine so an administrator can add or tweak matching logic without touching code • Automatic flagging of m...

    $161 Average bid
    $161 Avg Bid
    65 bids

    I need an automated solution to download, convert, and upload files. The process involves: - Downloading basic customs files (3 per category) - Converting from .tsv to .xlsx using Node.js - Uploading to PostgreSQL with KNIME Ideal Skills and Experience: - Proficient in Node.js - Experience with KNIME - Familiarity with PostgreSQL - Automation skills

    $10 / hr Average bid
    $10 / hr Avg Bid
    12 bids

    I need somebody with knime knowledge and postgres db I have insert statement with returning clause in the end - i want to see whats returned in the node below.

    $7 / hr Average bid
    $7 / hr Avg Bid
    3 bids

    ...model explainability System Goal: Estimate how long the engine will last Work to do : Main Goal:Prevent failure by optimizing control parameters to stay in safe range Tool Used:KNIME (industry tool with low-code + integration + visual workflows) Optimization Approach:Genetic Algorithms to find dynamic ranges that reduce failure risk Real-Time Capability:Real-time integration and alerting using KNIME Interpretability:Directly extract control ranges using SHAP + PDP for maintenance planning System Goal:Build an early-warning + optimization system that tells: “If your sensor_11 exceeds this range, act now”...

    $788 Average bid
    $788 Avg Bid
    54 bids

    I'm looking for a KNIME expert to help automate workflows that interact with spreadsheets. Key tasks include: - Data cleaning - Data transformation - Report generation Ideal skills and experience: - Proficiency in KNIME - Experience with workflow automation - Strong background in handling spreadsheets

    $6 / hr Average bid
    $6 / hr Avg Bid
    6 bids

    I need help configuring a Debian Linux system. The tasks include: - Enabling IP forwarding to route packets. - Setting up an SPAN decapsulation of ERM remote mirror, encapsulated in UDP - PCAP / tcpdump provided Ideal Skills: - Strong expertise in Debian Linux. - Experience with IP routing and enabling IP forwarding, creating ip interfaces - Familiarity with SPAN/ERSPAN configurations. Please ensure all configurations are secure and well-documented.

    $571 Average bid
    $571 Avg Bid
    34 bids

    I need a KNIME workflow recreated based on three provided screenshots. The existing workflow is designed for machine learning tasks. Requirements: - Create a KNIME workflow using the details from the screenshots. - No specific machine learning algorithms are visible in the screenshots. Ideal Skills: - Proficient in KNIME. - Experience with machine learning workflows. - Attention to detail to accurately replicate workflows from screenshots. Please ensure competence in KNIME and machine learning tasks.

    $23 Average bid
    $23 Avg Bid
    6 bids

    I'm looking for an expert to detect, analyze, and mitigate sophisticated cyberattacks using a provided PCAP file and related evidence. Deliverables: - Technical report (~3500 words) covering: - Detailed analysis of cyberattacks - Summary of vulnerabilities and defenses - Recommendations for future preventive measures - Screenshots of the script's output in the appendix - Defensive bash script to automate network defenses Requirements: - Conduct analysis in a controlled environment, preferably using a Virtual Machine (VM) for the PCAP file analysis. - Expertise in handling malware infections, phishing attacks, DDoS, psychological operations, and Advanced Persistent Threats (APTs) - Strong technical writing skills for comprehensive reporting Ideal Skills:...

    $15 / hr Average bid
    $15 / hr Avg Bid
    13 bids

    We are looking for an experienced freelance data professional with expertise in the following: Knime for data analytics workflows Prolog for logical programming and rule-based systems Ontology (Protege, OpenRefine, Fesuki Jena) for knowledge representation Python for data manipulation and analysis This is a short-term project focused on data mining, analytics, and data science tasks. If you have experience in these areas and can deliver high-quality results, we’d love to hear from you! Please submit your portfolio or relevant examples of your previous work.

    $32 Average bid
    $32 Avg Bid
    36 bids

    I am looking for a seasoned ETL specialist with extensive experience in Knime and Power BI. The primary goal of this project is data integration for analysis, pulling data from snowflake and QODBC. Key Responsibilities: - Design and implement ETL processes for data integration - Create and optimize Knime workflows - Develop Power BI dashboards for data visualization - Utilize Python for data manipulation and analysis Ideal Candidate: - Proficient in Knime and Power BI - Extensive experience with ETL processes - Skilled in Python - Familiar with snowflake and QODBC - Capable of creating data integration solutions for analysis purposes. - Speak Spanish (Better)

    $22 / hr Average bid
    $22 / hr Avg Bid
    33 bids

    Expert in knime analytics I'm going to provide details after.

    $29 Average bid
    $29 Avg Bid
    16 bids

    I have a project requiring the development of a model in KNIME. The data source spans 12 months and contains 183,843 lines of data across 96 parameters. I need a model capable of: - Identifying lines where the objective (column 5: Eval) is >= 1 (90% or more) - Selecting one line per day with the highest Eval The data is variable in terms of daily line numbers. The ideal candidate will have experience with KNIME and the following skills: - Proficiency in using Decision Tree algorithms - Expertise in data normalization - Ability to evaluate model accuracy Freelancer should also be able to: - Test the model outside the chosen sample, with a split of 70% for training and 30% for testing. - Complete project knime required. - file is update every day with new data...

    $164 Average bid
    $164 Avg Bid
    23 bids

    I need an expert in network security for writing Zeek and Suricata signatures on Wazuh for PCAP files. These signatures should help to detect malware, with a specific focus on unusual traffic spikes, suspicious IP addresses, and anomalous port usage. Key Requirements: - Analyze provided PCAP files for detection - Create signatures for various types of malware - Write rules for Zeek and Suricata on Wazuh - Focus on specific protocols: HTTP/HTTPS, SMTP/IMAP, and DNS Ideal Skills: - Extensive experience with Zeek and Suricata - Proficiency in writing network security signatures - Strong understanding of malware detection - Excellent skills in network traffic analysis - Familiarity with Wazuh and PCAP files.

    $141 Average bid
    $141 Avg Bid
    5 bids

    ...also be readily downloaded from outside the United States. The downloaded profile does not need to be activated and can be deleted after download. Additional details are in the one-page attachment. Note that multiple TLS sessions are established with the same domain for the eSIM profile download, so multiple private keys will need to be logged. The deliverable is to simply provide both (i) the pcap file for the TLS session with the eSIM profile download and (ii) provide the logged session private keys. Although the eSIM profile will itself be mostly encrypted even after the TLS session data is decrypted, the purpose is to review the plaintext metadata such as the "Store Metadata" portion of the eSIM profile for debugging purposes....

    $545 Average bid
    Featured
    $545 Avg Bid
    27 bids

    I need help with creating KNIME analytics workflows for a mini assignment analyzing our sales data. Key Tasks: - Perform thorough statistical analysis on sales data. This will involve descriptive statistics, inferential statistics, and correlation analysis. - Implement predictive modeling techniques to forecast future sales trends. Ideal Skills: - Proficiency in KNIME and its various functionalities. - Experience with sales data and understanding of key sales metrics. - Strong background in statistical analysis and predictive modeling. The successful freelancer will help me clean and preprocess our sales data, conduct in-depth statistical analysis, and develop predictive models to gain insights into our sales trends.

    $30 Average bid
    $30 Avg Bid
    7 bids

    I'm in need of a KNIME expert who can create a project workflow for data visualization with a focus on text data. This project is urgent and needs to be completed within a day. Key Responsibilities: - Develop a KNIME workflow that focuses on visualizing text data - Create specific visualizations, primarily word clouds, bar charts, and line graphs Ideal Skills: - Proficient in using KNIME for data visualization - Experienced in working with text data - Capable of creating a variety of visualizations If you can deliver this within the specified timeframe, please get in touch.

    $14 Average bid
    $14 Avg Bid
    3 bids

    I'm seeking a software developer to create a Daemen software for Windows. This software will listen for outgoing hardware signals, and capture packets with Wireshark. When the capture is done, the software will save the data to a PostgreSQL database in CSV format, rather than PCAP. The software needs to capture specific fields in the CSV data: - Timestamp - Source/Destination IP - Packet Content In the case of packet capture failures, the software should log errors and continue with the process. Ideal skills for this project include: - Proficiency in Windows software development - Experience with Wireshark and packet capturing - Knowledge of PostgreSQL - Ability to create software that can log errors

    $189 Average bid
    $189 Avg Bid
    15 bids

    ...and MO_FSM MAP messages, ensuring seamless operation across both simulated and live network environments. 3. Comprehensive Logging, Monitoring, and Error Handling: Implement robust logging, monitoring, and error-handling mechanisms to ensure system stability. 4. Documentation and Final Review: Deliver comprehensive documentation and conduct a final live demonstration of the solution, supported by PCAP files and recorded validations. Project Scope: • Setup and Configuration: Implement the Mobicents JSS7 stack without JBOSS and ensure proper integration of all required components. • MAP Message Routing and Network Integration: Develop and integrate routing logic and MAP message handling within both simulated and live network environments (where applicable). • Compre...

    $745 Average bid
    $745 Avg Bid
    1 bids

    I'm looking for a cybersecurity expert to do some of my projects with a due date. Skills & Experience Required: - knowledge of network security protocols - Proven experience in Wireshark and Python. - Expertise in network monitoring tools and techniques I have a pcap file that I need to do all tasks that are attached as flag1 to 6 done based on that file. I will send the file after accepting my work.

    $154 Average bid
    $154 Avg Bid
    12 bids

    ...of SIGTRAN protocols and MAP messaging systems. • Proven experience with Mobicents JSS7 stack and similar telecom frameworks. • Ability to troubleshoot, optimize, and scale telecom solutions for real-world deployment. Deliverables: • A fully functional Java-based solution with advanced routing and MAP messaging. • Demonstration of the solution in both simulated and live environments (including PCAP files). • Detailed documentation for setup, configuration, and deployment. Our Collaboration Approach: • We prioritize clear and consistent communication throughout the project. • Successful completion of this project may lead to future engagements as we value long-term partnerships. Next Steps: Please confirm: 1. Your understanding of the project ...

    $232 Average bid
    $232 Avg Bid
    7 bids

    ...of SIGTRAN protocols and MAP messaging systems. • Proven experience with Mobicents JSS7 stack and similar telecom frameworks. • Ability to troubleshoot, optimize, and scale telecom solutions for real-world deployment. Deliverables: • A fully functional Java-based solution with advanced routing and MAP messaging. • Demonstration of the solution in both simulated and live environments (including PCAP files). • Detailed documentation for setup, configuration, and deployment. Our Collaboration Approach: • We prioritize clear and consistent communication throughout the project. • Successful completion of this project may lead to future engagements as we value long-term partnerships. Next Steps: Please confirm: 1. Your understanding of the project ...

    $155 Average bid
    $155 Avg Bid
    7 bids

    looking for a skilled Tableau Data Analyst to help us examine health data and predict BMI levels using Tableau. The ideal candidate will have a strong background in data analysis and visualization, as well as experience with Tableau software. As a Tableau Data Analyst, you will be responsible for analyzing the health data provided, creating insightful visualizations, and de...software - Strong data analysis skills - Experience with health data analysis - Knowledge of predictive modeling techniques Requirement : Make sure that you submit the following files in One submission (do not separate them), marks will be deducted for submitting the wrong file types(wrong file types are .zip and .twb ): Report 2 (.doc) Tableau package ( Export package)(.twbx) Exported KNIME workfl...

    $7 / hr Average bid
    $7 / hr Avg Bid
    10 bids

    I'm in need of a Wireshark expert to help me analyze an MQTT connection issue. Here are the details of the job: All i need is understanding of issues what could be there just a pcap file basic analysis should be fine - Scope: This project requires a comprehensive packet loss analysis using Wireshark on an Ubuntu server. - Deliverable: I would prefer to receive the analysis in the form of a WireShark PCAP File. - Level of Detail: I need a step-by-step breakdown of the findings. Ideal Freelancer: - Experienced with Wireshark and MQTT - Ability to generate and interpret packet capture data - Proficient in providing detailed reports and explanations - Excellent communication skills to deliver information in video format

    $61 Average bid
    $61 Avg Bid
    5 bids

    ...2000 words. Key Skills and Tools: - Profound understanding of network vulnerabilities and cybersecurity threats. - Ability to conduct detailed vulnerability scanning and network traffic analysis. - Extensive experience in applying log analysis, incident response playbook, and threat intelligence feeds. - Strong documentation skills to create a detailed incident report. Additional Information: - A Pcap file will be provided for your analysis. - You should be able to work efficiently and provide precise and timely deliverables. - Your output will be crucial in enhancing our network security and response strategy. I'm looking for a seasoned cybersecurity expert who can help me establish a solid security infrastructure across various facets of our system. Key Requirements: -...

    $81 Average bid
    $81 Avg Bid
    20 bids