Sciweavers

741 search results - page 12 / 149
» Tools and techniques for Network Forensics
Sort
View
CAISE
2003
Springer
14 years 25 days ago
Evaluation of the SRA Tool Using Data Mining Techniques
This paper describes a validation approach of a socio-technical design support system using data mining techniques. Bayesian Belief Networks (BBN) are used to assess human error an...
Andreas Gregoriades, Alistair G. Sutcliffe, Harala...
RAID
2010
Springer
13 years 6 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
IFIP
2007
Springer
14 years 1 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
SIGMETRICS
2010
ACM
206views Hardware» more  SIGMETRICS 2010»
14 years 12 days ago
Successive c-optimal designs: a scalable technique to optimize the measurements on large networks
We propose a new approach to optimize the deployment and the sampling rates of network monitoring tools, such as Netflow, on a large IP network. It reduces to solving a stochasti...
Guillaume Sagnol, Mustapha Bouhtou, Stephane Gaube...
IWCF
2009
Springer
14 years 2 months ago
Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings
The Electric Network Frequency (ENF) Criterion is a recently developed forensic technique for determining the time of recording of digital audio recordings, by matching the ENF pat...
Maarten Huijbregtse, Zeno Geradts