共 50 条
- [1] Highly Efficient Techniques for Network Forensics [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 150 - 160
- [2] New Developments In Network Forensics - Tools and Techniques [J]. 2012 18th IEEE International Conference on Networks (ICON), 2012, : 376 - 381
- [5] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics [J]. Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
- [6] A neurofuzzy classification network and its application [J]. 1998 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5, 1998, : 4234 - 4239
- [7] Challenges in Network forensics [J]. 2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1382 - 1386
- [10] Trusted Internet Forensics: design of a network forensics appliance [J]. 2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 35 - 37