Network forensics and challenges for cybersecurity

被引:0
|
作者
Wojciech Mazurczyk
Krzysztof Szczypiorski
Hui Tian
机构
[1] Warsaw University of Technology,
[2] National Huaqiao University,undefined
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:345 / 346
页数:1
相关论文
共 50 条
  • [1] Network forensics and challenges for cybersecurity
    Mazurczyk, Wojciech
    Szczypiorski, Krzysztof
    Tian, Hui
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 345 - 346
  • [2] Challenges in Network forensics
    Buric, J.
    Delija, D.
    [J]. 2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1382 - 1386
  • [3] Network Forensics: Notions and Challenges
    Almulhem, Ahmad
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT 2009), 2009, : 463 - 466
  • [4] Challenges to Network Forensics in Cloud Computing
    Raza, Nasir
    [J]. 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 22 - 29
  • [5] Network forensics: Review, taxonomy, and open challenges
    Khan, Suleman
    Gani, Abdullah
    Wahab, Ainuddin Wahid Abdul
    Shiraz, Muhammad
    Ahmad, Iftikhar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 214 - 235
  • [6] Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection
    Pimenta Rodrigues, Gabriel Arquelau
    Albuquerque, Robson de Oliveira
    Gomes de Deus, Flavio Elias
    de Sousa, Rafael Timoteo, Jr.
    de Oliveira Junior, Gildasio Antonio
    Garcia Villalba, Luis Javier
    Kim, Tai-Hoon
    [J]. APPLIED SCIENCES-BASEL, 2017, 7 (10):
  • [7] Challenges in cybersecurity
    Tang, Thomas S. K.
    [J]. ASIAN JOURNAL OF BUSINESS ETHICS, 2024, 13 (SUPPL 1) : 13 - 19
  • [8] Steganography and Steganalysis (in digital forensics): a Cybersecurity guide
    Mukesh Dalal
    Mamta Juneja
    [J]. Multimedia Tools and Applications, 2021, 80 : 5723 - 5771
  • [9] Using Google Analytics to Support Cybersecurity Forensics
    Qin, Han
    Riehle, Kit
    Zhao, Haozhen
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 3831 - 3834
  • [10] Steganography and Steganalysis (in digital forensics): a Cybersecurity guide
    Dalal, Mukesh
    Juneja, Mamta
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (04) : 5723 - 5771