Sciweavers

382 search results - page 68 / 77
» Tracing Network Attacks to Their Sources
Sort
View
SEC
2008
13 years 9 months ago
A Live Digital Forensic system for Windows networks
This paper presents FOXP (computer FOrensic eXPerience), an open source project to support network Live Digital Forensics (LDF), where the network nodes run a Windows NT family Ope...
Roberto Battistoni, Alessandro Di Biagio, Roberto ...
CSREASAM
2006
13 years 9 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
DSN
2005
IEEE
14 years 1 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion
IPTPS
2005
Springer
14 years 1 months ago
An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System
Maze1 is a P2P file-sharing system with an active and large user base. It is developed, deployed and operated by an academic research team. As such, it offers ample opportunities ...
Mao Yang, Zheng Zhang, Xiaoming Li, Yafei Dai
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
13 years 11 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith