Sciweavers

7544 search results - page 6 / 1509
» Network Forensics Analysis
Sort
View
SIGMOD
2006
ACM
121views Database» more  SIGMOD 2006»
14 years 7 months ago
Forensic analysis of database tampering
Kyriacos E. Pavlou, Richard T. Snodgrass
ICASSP
2008
IEEE
14 years 1 months ago
A pattern classification framework for theoretical analysis of component forensics
Component forensics is an emerging methodology for forensic analysis that aims at estimating the algorithms and parameters in each component of a digital device. This paper propos...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
SADFE
2008
IEEE
14 years 1 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
CONEXT
2010
ACM
13 years 5 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
SEC
2008
13 years 9 months ago
A Live Digital Forensic system for Windows networks
This paper presents FOXP (computer FOrensic eXPerience), an open source project to support network Live Digital Forensics (LDF), where the network nodes run a Windows NT family Ope...
Roberto Battistoni, Alessandro Di Biagio, Roberto ...