共 50 条
- [23] Comparative survey of local honeypot sensors to assist network forensics [J]. FIRST INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2005, : 120 - 132
- [24] Challenges on Digital Cyber-Security and Network Forensics: A Survey [J]. ADVANCES ON INTELLIGENT INFORMATICS AND COMPUTING: HEALTH INFORMATICS, INTELLIGENT SYSTEMS, DATA SCIENCE AND SMART COMPUTING, 2022, 127 : 524 - 537
- [25] A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing [J]. SCIENTIFIC WORLD JOURNAL, 2014,
- [26] An Empirical Study of Network Forensics Analysis Tools [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 366 - 370
- [27] Attack Intention Analysis Model for Network Forensics [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411
- [28] Understanding Network Forensics Analysis in an Operational Environment [J]. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118
- [29] Building evidence graphs for network forensics analysis [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 229 - 239
- [30] Network Security Approach for Digital Forensics Analysis [J]. ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267