共 50 条
- [41] Intrusion detection techniques in network environment: a systematic review Wireless Networks, 2021, 27 : 1269 - 1285
- [43] Network forensics of SSL/TLS encrypted channels ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 303 - 312
- [44] Native Actors: How to Scale Network Forensics SIGCOMM'14: PROCEEDINGS OF THE 2014 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2014, : 141 - 142
- [45] Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection APPLIED SCIENCES-BASEL, 2017, 7 (10):
- [46] A Secure Storage Model to Preserve Evidence in Network Forensics SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 391 - 402
- [47] Using peer-to-peer technology for network forensics ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 141 - 152
- [48] Failure Detection in Network Forensics for Volatile Data Acquisition PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 342 - 347
- [49] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
- [50] Review on Network Intrusion Detection Techniques using Machine Learning PROCEEDINGS OF 2018 IEEE DISTRIBUTED COMPUTING, VLSI, ELECTRICAL CIRCUITS AND ROBOTICS (DISCOVER), 2018, : 104 - 109