Sciweavers

741 search results - page 12 / 149
» Tools and techniques for Network Forensics
Sort
View
90
Voted
CAISE
2003
Springer
15 years 5 months ago
Evaluation of the SRA Tool Using Data Mining Techniques
This paper describes a validation approach of a socio-technical design support system using data mining techniques. Bayesian Belief Networks (BBN) are used to assess human error an...
Andreas Gregoriades, Alistair G. Sutcliffe, Harala...
123
Voted
RAID
2010
Springer
14 years 11 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
IFIP
2007
Springer
15 years 6 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
SIGMETRICS
2010
ACM
206views Hardware» more  SIGMETRICS 2010»
15 years 5 months ago
Successive c-optimal designs: a scalable technique to optimize the measurements on large networks
We propose a new approach to optimize the deployment and the sampling rates of network monitoring tools, such as Netflow, on a large IP network. It reduces to solving a stochasti...
Guillaume Sagnol, Mustapha Bouhtou, Stephane Gaube...
IWCF
2009
Springer
15 years 7 months ago
Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings
The Electric Network Frequency (ENF) Criterion is a recently developed forensic technique for determining the time of recording of digital audio recordings, by matching the ENF pat...
Maarten Huijbregtse, Zeno Geradts