Sciweavers

450 search results - page 21 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
NBIS
2009
Springer
15 years 4 months ago
Challenges in the Development of Mobile Applications in Industrial Field Service
Utilizing mobile applications in the area of industrial field service promises several benefits, especially improved process support providing tailored service information and p...
Markus Aleksy, Bernd Stieger
JDFP
2008
81views more  JDFP 2008»
14 years 9 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
ACSAC
2008
IEEE
15 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
RAID
2010
Springer
14 years 8 months ago
On Challenges in Evaluating Malware Clustering
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
ADHOCNOW
2007
Springer
15 years 3 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...