The application research on network forensics

被引:0
|
作者
机构
[1] Jingfang, Hu
[2] Busheng, Li
来源
Jingfang, H. (jdzhjf@163.com) | 1600年 / Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands卷 / 05期
关键词
All Open Access; Bronze; Green;
D O I
10.2174/1874444301305010167
中图分类号
学科分类号
摘要
14
引用
收藏
相关论文
共 50 条
  • [21] 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - Computer Network Forensics Research Workshop 2005 "Defining network forensics"
    2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - SECURECOMM, 2005, : 1 - 1
  • [22] Network Forensics with Neurofuzzy Techniques
    Aguirre Anaya, Eleazar
    Nakano-Miyatake, Mariko
    Perez Meana, Hector Manuel
    2009 52ND IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2009, : 848 - 852
  • [23] Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities
    Nash, Aleck
    Choo, Kim-Kwang Raymond
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 31 - 53
  • [24] Network Forensics: Notions and Challenges
    Almulhem, Ahmad
    2009 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT 2009), 2009, : 463 - 466
  • [25] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +
  • [26] ForNet: A distributed forensics network
    Shanmugasundaram, K
    Memon, N
    Savant, A
    Bronnimann, H
    COMPUTER NETWORK SECURITY, 2003, 2776 : 1 - 16
  • [27] A SURVEY OF SOCIAL NETWORK FORENSICS
    Karabiyik, Umit
    Canbaz, Muhammed Abdullah
    Aksoy, Ahmet
    Tuna, Tayfun
    Akbas, Esra
    Gonen, Bilal
    Aygun, Ramazan S.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2016, 11 (04) : 55 - 128
  • [28] Network forensics and the inside job
    Security Strategy, CA EMEA
    Netw. Secur., 2006, 12 (11-13):
  • [29] Network forensics and challenges for cybersecurity
    Mazurczyk, Wojciech
    Szczypiorski, Krzysztof
    Tian, Hui
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 345 - 346
  • [30] Modeling the network forensics behaviors
    Ren, Wei
    Jin, Hai
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 3 - 10