Validation of Rules Used in Foxy Peer-to-Peer Network Investigations
暂无分享,去创建一个
[1] K. P. Chow,et al. Forensic Investigation of Peer-to-Peer Networks , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.
[2] Ka-ying. Lai,et al. Profiling internet pirates , 2011 .
[3] Michael Y. K. Kwan,et al. Security Analysis of the Foxy Peer-to-Peer File Sharing Tool , 2008 .
[4] K. P. Chow,et al. A Model for Foxy Peer-to-Peer Network Investigations , 2009, IFIP Int. Conf. Digital Forensics.
[5] Bernie Mulgrew,et al. Proceedings IEEE International Conference on Communications , 1989 .
[6] Bin Fan,et al. Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems , 2006, 2006 IEEE International Conference on Communications.
[7] Sujeet Shenoi,et al. Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers , 2009, IFIP Int. Conf. Digital Forensics.
[8] Kam-Pui Chow,et al. Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers , 2010, IFIP Int. Conf. Digital Forensics.
[9] Chang-Tsun Li. Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.
[10] K. P. Chow,et al. Identifying First Seeders in Foxy Peer-to-Peer Networks , 2010, IFIP Int. Conf. Digital Forensics.
[11] K.P. Chow,et al. BTM - An Automated Rule-based BT Monitoring System for Piracy Detection , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).