Sciweavers

49 search results - page 2 / 10
» Computer Forensics in the Global Enterprise
Sort
View
ICNP
2006
IEEE
13 years 11 months ago
Forensic Analysis for Epidemic Attacks in Federated Networks
— We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the origin of epidemic spreading attacks. ADs in th...
Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Z...
EKNOW
2009
13 years 3 months ago
Enterprise Knowledge Clouds: Next Generation KM Systems?
We are witnessing the emergence of the global, dependable and efficient infrastructure of cloud computing. We assess the current state of the Enterprise Knowledge Management field...
Kemal A. Delic, Jeff A. Riley
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 7 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
CCS
2007
ACM
13 years 9 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
ICDAR
2009
IEEE
13 years 3 months ago
Semi-automatic Forensic Reconstruction of Ripped-up Documents
Manual reconstruction of ripped-up documents can be a very difficult and time-consuming task. This paper discusses a semi-automatic toolset that can be used for reconstructing rip...
Patrick de Smet