Foundation of Network Forensics

被引:4
|
作者
Dobrynin, Andrey V. [1 ]
Jacobs, Michael [2 ]
Tian, Yuan [1 ]
机构
[1] Univ North Carolina Chapel Hill, Dept Chem, Chapel Hill, NC 27599 USA
[2] Oak Ridge Natl Lab, Ctr Nanophase Mat Sci, Oak Ridge, TN 37830 USA
基金
美国国家科学基金会;
关键词
RUBBER ELASTICITY; NONLINEAR ELASTICITY; TUBE-MODEL; ELASTOMERS;
D O I
10.1021/acs.macromol.3c00612
中图分类号
O63 [高分子化学(高聚物)];
学科分类号
070305 ; 080501 ; 081704 ;
摘要
We develop a forensic-like framework for network structural characterization based on an analysis of their nonlinear response to mechanical deformation. For model networks, this methodology provides information about the strand degree of polymerization between cross-links, the effective cross-link functionality, the contribution of loops and entanglements to network elasticity, as well as the fraction of stress-supporting strands. For networks with trapped entanglements, we identify a transition from cross-link-controlled to entanglement-controlled network elasticity with increasing degree of polymerization of network strands between cross-links and show how specific features of this transition are manifested in changes of entanglement and structural shear moduli characterizing different modes of network deformation. In particular, this cross-link-to-entanglement transition results in saturation of the network shear modulus at small deformations and renormalization of the degree of polymerization of the effective network strands determining nonlinear elastic response in the strongly entangled networks. The developed approach enables the classification of networks according to their topology and effectiveness of stress distribution between network strands.
引用
收藏
页码:9289 / 9296
页数:8
相关论文
共 50 条
  • [21] Network Forensics in GSE Overlay Networks
    Pluskal, Jan
    Vondracek, Martin
    Rysavy, Ondrej
    PROCEEDINGS OF THE 6TH CONFERENCE ON THE ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS 2019), 2020,
  • [22] DATA VISUALIZATION FOR SOCIAL NETWORK FORENSICS
    Mulazzani, Martin
    Huber, Markus
    Weippl, Edgar
    ADVANCES IN DIGITAL FORENSICS VIII, 2012, 383 : 112 - 123
  • [23] Characterising Network Traffic for Skype Forensics
    Azab, Ahmad
    Watters, Paul
    Layton, Robert
    2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, : 19 - 27
  • [24] Challenges to Network Forensics in Cloud Computing
    Raza, Nasir
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 22 - 29
  • [25] Network Forensics Investigation for Botnet Attack
    Sembiring, Irwan
    Nugroho, Yonathan Satrio
    IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 228 - 236
  • [26] Network Forensics: Methodical Literature Review
    Shrivastava, Ciushan
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2203 - 2208
  • [27] Studies of network coordinative forensics computing
    Zhang Y.-D.
    Zeng Q.-K.
    Wang J.-D.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (03): : 504 - 513
  • [28] Experience with engineering a network forensics system
    Almulhem, A
    Traore, I
    INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 62 - 71
  • [29] Privacy-Preserving Network Forensics
    Afanasyev, Mikhail
    Kohno, Tadayoshi
    Ma, Justin
    Murphy, Nick
    Savage, Stefan
    Snoeren, Alex C.
    Voelker, Geoffrey M.
    COMMUNICATIONS OF THE ACM, 2011, 54 (05) : 78 - 87
  • [30] A fuzzy expert system for network forensics
    Kim, JS
    Kim, M
    Noh, BN
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 175 - 182