Sciweavers

718 search results - page 1 / 144
» Toward Models for Forensic Analysis
Sort
View
SADFE
2007
IEEE
13 years 11 months ago
Toward Models for Forensic Analysis
The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a m...
Sean Peisert, Matt Bishop, Sidney Karin, Keith Mar...
FGCN
2008
IEEE
111views Communications» more  FGCN 2008»
13 years 12 months ago
Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics
Today, honeypot operators are strongly relying on network analysis tools to examine network traces collected in their honeynet environment. The accuracy of such analysis depends o...
Gérard Wagener, Alexandre Dulaunoy, Thomas ...
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 6 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
SADFE
2008
IEEE
13 years 12 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
ICOIN
2005
Springer
13 years 11 months ago
Experience with Engineering a Network Forensics System
Network Forensics is an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on th...
Ahmad Almulhem, Issa Traoré