共 50 条
- [31] A Secure Storage Model to Preserve Evidence in Network Forensics SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 391 - 402
- [32] Using peer-to-peer technology for network forensics ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 141 - 152
- [33] Failure Detection in Network Forensics for Volatile Data Acquisition PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 342 - 347
- [34] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
- [35] Network forensics on mobile ad-hoc networks KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
- [37] Emerging Threats, Risks and Mitigation Strategies in Network Forensics 2011 24TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2011, : 1228 - 1232
- [38] Network forensics based on scenario reconstruction and alert aggregation Dong, X.-M. (dongxiaomei@ise.neu.edu.cn), 1600, Northeast University (29): : 39 - 44
- [39] Data Reduction for Network Forensics Using Manifold Learning 2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,