Foundation of Network Forensics

被引:4
|
作者
Dobrynin, Andrey V. [1 ]
Jacobs, Michael [2 ]
Tian, Yuan [1 ]
机构
[1] Univ North Carolina Chapel Hill, Dept Chem, Chapel Hill, NC 27599 USA
[2] Oak Ridge Natl Lab, Ctr Nanophase Mat Sci, Oak Ridge, TN 37830 USA
基金
美国国家科学基金会;
关键词
RUBBER ELASTICITY; NONLINEAR ELASTICITY; TUBE-MODEL; ELASTOMERS;
D O I
10.1021/acs.macromol.3c00612
中图分类号
O63 [高分子化学(高聚物)];
学科分类号
070305 ; 080501 ; 081704 ;
摘要
We develop a forensic-like framework for network structural characterization based on an analysis of their nonlinear response to mechanical deformation. For model networks, this methodology provides information about the strand degree of polymerization between cross-links, the effective cross-link functionality, the contribution of loops and entanglements to network elasticity, as well as the fraction of stress-supporting strands. For networks with trapped entanglements, we identify a transition from cross-link-controlled to entanglement-controlled network elasticity with increasing degree of polymerization of network strands between cross-links and show how specific features of this transition are manifested in changes of entanglement and structural shear moduli characterizing different modes of network deformation. In particular, this cross-link-to-entanglement transition results in saturation of the network shear modulus at small deformations and renormalization of the degree of polymerization of the effective network strands determining nonlinear elastic response in the strongly entangled networks. The developed approach enables the classification of networks according to their topology and effectiveness of stress distribution between network strands.
引用
收藏
页码:9289 / 9296
页数:8
相关论文
共 50 条
  • [1] A NIST Scientific Foundation Review of Digital Forensics
    Guttman, Barbara
    2022 IEEE 29TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC 2022), 2022,
  • [2] Challenges in Network forensics
    Buric, J.
    Delija, D.
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1382 - 1386
  • [3] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66
  • [4] Trusted Internet Forensics: design of a network forensics appliance
    Bruschi, D.
    Monga, M.
    Rosti, E.
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 35 - 37
  • [5] The application research on network forensics
    Jingfang, H. (jdzhjf@163.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (05):
  • [6] Network forensics and challenges for cybersecurity
    Wojciech Mazurczyk
    Krzysztof Szczypiorski
    Hui Tian
    annals of telecommunications - annales des télécommunications, 2014, 69 : 345 - 346
  • [7] An architecture for SCADA network forensics
    Kilpatrick, T.
    Gonzalez, J.
    Chandia, R.
    Papa, M.
    Shenoi, S.
    ADVANCES IN DIGITAL FORENSICS II, 2006, 222 : 273 - +
  • [8] Network forensics on packet fingerprints
    Cho, Chia Yuan
    Lee, Sin Yeung
    Tan, Chung Pheng
    Tan, Yong Tai
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 401 - +
  • [9] Network Forensics: Today and Tomorrow
    Shrivastava, Gulshan
    Sharma, Kavita
    Kumari, Reema
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2234 - 2238
  • [10] Network Forensics with Neurofuzzy Techniques
    Aguirre Anaya, Eleazar
    Nakano-Miyatake, Mariko
    Perez Meana, Hector Manuel
    2009 52ND IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2009, : 848 - 852