The application research on network forensics

被引:0
|
作者
机构
[1] Jingfang, Hu
[2] Busheng, Li
来源
Jingfang, H. (jdzhjf@163.com) | 1600年 / Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands卷 / 05期
关键词
All Open Access; Bronze; Green;
D O I
10.2174/1874444301305010167
中图分类号
学科分类号
摘要
14
引用
收藏
相关论文
共 50 条
  • [31] Research and development of memory forensics
    Zhang, Yu
    Liu, Qing-Zhong
    Li, Tao
    Wu, Li-Hua
    Shi, Chun
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (05): : 1151 - 1172
  • [32] The Research on Linux Memory Forensics
    Zhang, Jun
    Che, ShengBing
    2017 INTERNATIONAL SYMPOSIUM ON APPLICATION OF MATERIALS SCIENCE AND ENERGY MATERIALS (SAMSE 2017), 2018, 322
  • [33] Cloud forensics: A research perspective
    Almulla, Sameera
    Iraqi, Youssef
    Jones, Andrew
    2013 9TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2013,
  • [34] Fashion improves forensics research
    不详
    R&D MAGAZINE, 1998, 40 (13): : 78 - 78
  • [35] Research and Review on Computer Forensics
    Guo Hong
    Jin Bo
    Huang Daoli
    CHINA COMMUNICATIONS, 2010, 7 (06) : 37 - 43
  • [36] Research on Metaverse Security and Forensics
    Liang, Guangjun
    Xin, Jianfang
    Wang, Qun
    Ni, Xueli
    Guo, Xiangmin
    Chen, Pu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 799 - 825
  • [37] Digital Forensics Research on Cloud Computing: An investigation of Cloud Forensics Solutions
    Morioka, Erni
    Sharbaf, Mehrdad S.
    2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [38] An Approach to Detect Network Attacks Applied for Network Forensics
    Nguyen, Khoa
    Tran, Dat
    Ma, Wanli
    Sharma, Dharmendra
    2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 655 - 660
  • [39] SIMILARITY COEFFICIENT GENERATORS FOR NETWORK FORENSICS
    Telidevara, A.
    Chandrasekaran, V.
    Srinivasan, A.
    Mukkamala, R.
    Gampa, S.
    2010 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2010,
  • [40] Network Forensics in GSE Overlay Networks
    Pluskal, Jan
    Vondracek, Martin
    Rysavy, Ondrej
    PROCEEDINGS OF THE 6TH CONFERENCE ON THE ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS 2019), 2020,