Sciweavers

7544 search results - page 2 / 1509
» Network Forensics Analysis
Sort
View
KES
2005
Springer
13 years 11 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
AUSFORENSICS
2003
13 years 6 months ago
Honeyd - A OS Fingerprinting Artifice
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis...
Craig Valli
RAID
2010
Springer
13 years 3 months ago
Live and Trustworthy Forensic Analysis of Commodity Production Systems
Lorenzo Martignoni, Aristide Fattori, Roberto Pale...
ACSAC
2005
IEEE
13 years 11 months ago
Building Evidence Graphs for Network Forensics Analysis
In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the...
Wei Wang, Thomas E. Daniels
CACM
2006
192views more  CACM 2006»
13 years 5 months ago
Live forensics: diagnosing your system without killing it first
: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
Frank Adelstein