A small portable network forensic evidence collection device is presented which is built using inexpensive embedded hardware and open source software. The device oers several mode...
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...