共 50 条
- [22] A Method to Automatically Filter Log Evidences for Intrusion Forensics 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 39 - 44
- [23] Android Asset Packaging Tool based Forensics Security and Predictive Analysis JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (03): : 124 - 131
- [24] Research and Implementation of Computer Network User Behavior Forensics Analysis System Based on System Log AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 458 - 461
- [25] Complexity analysis of retrieving knowledge from auditing log files for computer and network forensics and accountability 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1474 - 1478
- [26] Exploration and implementation of user behavior forensics analysis system of computer network based on system log Acta Technica CSAV (Ceskoslovensk Akademie Ved), 2017, 62 (02): : 53 - 62
- [27] Anti-Forensics: The Next Step in Digital Forensics Tool Testing 2013 SEVENTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSICS (IMF 2013), 2013, : 83 - 97
- [28] Analysis of visitor's behavior from Web Log using Web Log Expert Tool 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 296 - 301
- [30] Database memory forensics: Identifying cache patterns for log verification FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 45