Sciweavers

7 search results - page 1 / 2
» iPOD Forensics Update
Sort
View
IJDE
2007
110views more  IJDE 2007»
13 years 4 months ago
iPOD Forensics Update
From student to business worker, the popularity and ubiquity of mobile devices is exploding. As these devices saturate modern culture, they continue to grow in functionality. Such...
Matthew Kiley, Tim Shinbara, Marcus Rogers
MINENET
2006
ACM
13 years 11 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
13 years 11 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay
NSPW
2004
ACM
13 years 10 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
CORR
2007
Springer
135views Education» more  CORR 2007»
13 years 4 months ago
Detailed Network Measurements Using Sparse Graph Counters: The Theory
— Measuring network flow sizes is important for tasks like accounting/billing, network forensics and security. Per-flow accounting is considered hard because it requires that m...
Yi Lu, Andrea Montanari, Balaji Prabhakar