Sciweavers

7544 search results - page 22 / 1509
» Network Forensics Analysis
Sort
View
EUROSYS
2006
ACM
14 years 5 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
14 years 3 months ago
Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling
— The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logic...
Innocentia Dlamini, Martin Olivier, Sihle Sibiya
ICDAR
2011
IEEE
12 years 8 months ago
Identification of Indic Scripts on Torn-Documents
—Questioned Document Examination processes often encompass analysis of torn documents. To aid a forensic expert, automatic classification of content type in torn documents might ...
Sukalpa Chanda, Katrin Franke, Umapada Pal
DOCENG
2010
ACM
13 years 9 months ago
Document imaging security and forensics ecosystem considerations
: Document Imaging Security and Forensics Ecosystem Considerations Steven Simske, Margaret Sturgill, Guy Adams, Paul Everest HP Laboratories HPL-2010-156 Security, Forensics, Colo...
Steven J. Simske, Margaret Sturgill, Guy Adams, Pa...
CCS
2006
ACM
14 years 12 days ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...