Sciweavers

741 search results - page 11 / 149
» Tools and techniques for Network Forensics
Sort
View
SNPD
2008
13 years 9 months ago
Tools and Techniques for Model Checking Networked Programs
For software executing several threads in parallel, testing is unreliable, as it cannot cover all thread schedules. Model checking, however, can cover all possible thread interlea...
Cyrille Artho, Watcharin Leungwattanakit, Masami H...
CCS
2003
ACM
14 years 25 days ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
PASTE
2010
ACM
14 years 20 days ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
DSOM
2007
Springer
14 years 1 months ago
Virtualization-Based Techniques for Enabling Multi-tenant Management Tools
As service providers strive to improve the quality and efficiency of their IT (information technology) management services, the need to adopt a standard set of tools and processes...
Chang-Hao Tsai, Yaoping Ruan, Sambit Sahu, Anees S...
JEI
2006
125views more  JEI 2006»
13 years 7 months ago
Image manipulation detection
Abstract. Techniques and methodologies for validating the authenticity of digital images and testing for the presence of doctoring and manipulation operations on them has recently ...
Sevinc Bayram, Ismail Avcibas, Bülent Sankur,...