CCS
13 years 11 months ago
2010 ACM
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
SP
13 years 8 months ago
2010 IEEE WISTP
13 years 12 months ago
2010 Springer
Reliable, inexpensive, on-the-fly networks can be established using mobile ad-hoc network (MANET) technology. Such networks can be used in a wide variety of scenarios ranging from...
ACSAC
13 years 2 months ago
2010 IEEE
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
IEEEARES
13 years 10 months ago
2010 IEEE
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
|