共 50 条
- [31] CAS: Content Attribution System for Network Forensics TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 129 - 136
- [32] Packet analysis for network forensics: A comprehensive survey FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
- [33] Design and configuration of a network security and forensics lab ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 242 - 246
- [34] A Graded Approach to Network Forensics with Privacy Concerns 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 292 - 297
- [35] Using peer-to-peer technology for network forensics ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 141 - 152
- [36] Failure Detection in Network Forensics for Volatile Data Acquisition PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 342 - 347
- [37] A Secure Storage Model to Preserve Evidence in Network Forensics SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 391 - 402
- [38] Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems 4TH ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2018), 2018, : 1 - 8
- [40] Introduction to a Network Forensics System for Cyber Incidents Analysis 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 50 - 55