136
click to vote
CCS
15 years 8 months ago
2010 ACM
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
148
click to vote
WISTP
15 years 8 months ago
2010 Springer
Reliable, inexpensive, on-the-fly networks can be established using mobile ad-hoc network (MANET) technology. Such networks can be used in a wide variety of scenarios ranging from...
129
click to vote
ACSAC
14 years 11 months ago
2010 IEEE
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
129
click to vote
IEEEARES
15 years 6 months ago
2010 IEEE
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
|