Sciweavers

Share
ACSAC   2010 Annual Computer Security Applications Conference
Wall of Fame | Most Viewed ACSAC-2010 Paper
ACSAC
2010
IEEE
8 years 8 months ago
Forenscope: a framework for live forensics
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
Ellick Chan, Shivaram Venkataraman, Francis M. Dav...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source376
2Download preprint from source343
3Download preprint from source320
4Download preprint from source295
5Download preprint from source289
6Download preprint from source289
7Download preprint from source282
8Download preprint from source278
9Download preprint from source277
10Download preprint from source276
11Download preprint from source266
12Download preprint from source264
13Download preprint from source256
14Download preprint from source252
15Download preprint from source249
16Download preprint from source242
17Download preprint from source241
18Download preprint from source238
19Download preprint from source235
20Download preprint from source232
21Download preprint from source230
22Download preprint from source230
23Download preprint from source228
24Download preprint from source228
25Download preprint from source225
26Download preprint from source221
27Download preprint from source220
28Download preprint from source220
29Download preprint from source220
30Download preprint from source220
31Download preprint from source217
32Download preprint from source206
33Download preprint from source200
books