Sciweavers

7544 search results - page 5 / 1509
» Network Forensics Analysis
Sort
View
MINENET
2006
ACM
14 years 1 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
ISTA
2004
13 years 8 months ago
On a Network Forensics Model For Information Security
: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Wei Ren
ACSAC
2003
IEEE
14 years 23 days ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
JDFP
2008
81views more  JDFP 2008»
13 years 7 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
ACSAC
2010
IEEE
13 years 5 months ago
Forenscope: a framework for live forensics
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
Ellick Chan, Shivaram Venkataraman, Francis M. Dav...