Sciweavers

7544 search results - page 4 / 1509
» Network Forensics Analysis
Sort
View
INTERNET
2002
87views more  INTERNET 2002»
13 years 7 months ago
Network Forensics Analysis
Vicka Corey, Charles Peterman, Sybil Shearin, Mich...
SAC
2011
ACM
12 years 10 months ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 1 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
SIGMOD
2010
ACM
167views Database» more  SIGMOD 2010»
13 years 7 months ago
Efficient querying and maintenance of network provenance at internet-scale
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network p...
Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, B...
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
14 years 1 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay