Sciweavers

741 search results - page 1 / 149
» Tools and techniques for Network Forensics
Sort
View
FGCN
2008
IEEE
111views Communications» more  FGCN 2008»
13 years 11 months ago
Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics
Today, honeypot operators are strongly relying on network analysis tools to examine network traces collected in their honeynet environment. The accuracy of such analysis depends o...
Gérard Wagener, Alexandre Dulaunoy, Thomas ...
CORR
2010
Springer
47views Education» more  CORR 2010»
13 years 5 months ago
Tools and techniques for Network Forensics
Natarajan Meghanathan, Sumanth Reddy Allam, Lorett...
CCS
2007
ACM
13 years 9 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
AINA
2010
IEEE
13 years 10 months ago
InnoDB Database Forensics
— Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) ti...
Peter Fruhwirt, Marcus Huber, Martin Mulazzani, Ed...
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
13 years 11 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...