共 50 条
- [2] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
- [3] A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions IEEE ACCESS, 2022, 10 : 11065 - 11089
- [5] Modeling the network forensics behaviors 2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 3 - 10
- [6] Network Forensics Investigation for Botnet Attack IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 228 - 236
- [7] Application Virtualization Techniques for Malware Forensics in Social Engineering 2015 INTERNATIONAL CONFERENCE ON CYBERSPACE (CYBER-ABUJA), 2015, : 45 - 56
- [9] Packet analysis for network forensics: A comprehensive survey FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
- [10] Understanding Network Forensics Analysis in an Operational Environment IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118