Sciweavers

8 search results - page 1 / 2
» ausforensics 2003
Sort
View
AUSFORENSICS
2003
13 years 6 months ago
Testing the Date Maintenance of the File Allocation Table File System
The directory entries used in the File Allocation Table filesystems maintain a significant amount of file metadata that is of interest to a forensic examiner. This information is ...
Tom Waghorn
AUSFORENSICS
2003
13 years 6 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
AUSFORENSICS
2003
13 years 6 months ago
Incident Management and Incident Response: The Case of Sweden
This paper reports from an ongoing field study of police practice in Sweden. The field study consists of direct observations and conversational interviews. The paper discusses cur...
Urban Nuldén
AUSFORENSICS
2003
13 years 6 months ago
Honeyd - A OS Fingerprinting Artifice
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis...
Craig Valli