164
click to vote
CCS
15 years 10 months ago
2010 ACM
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
185
Voted
WISTP
15 years 11 months ago
2010 Springer
Reliable, inexpensive, on-the-fly networks can be established using mobile ad-hoc network (MANET) technology. Such networks can be used in a wide variety of scenarios ranging from...
149
Voted
ACSAC
15 years 2 months ago
2010 IEEE
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
153
click to vote
IEEEARES
15 years 9 months ago
2010 IEEE
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
|