Increasingly advances in file carving, memory analysis and network forensics requires the ability to identify the underlying type of a file given only a file fragment. Work to dat...
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...
This review paper outlines the need for research into the process of automating the detection of paedophile activities on the Internet and identifies the associated challenges of ...
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...