A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation
暂无分享,去创建一个
Zhen Ling | Xinwen Fu | Junwei Huang | Yinjie Chen | Kyungseok Choo | Junwei Huang | Yinjie Chen | Zhen Ling | Kyungseok Choo | Xinwen Fu
[1] Gang Wang,et al. I am the antenna: accurate outdoor AP location using smartphones , 2011, MobiCom '11.
[2] Brian Neil Levine,et al. Forensic investigation of the OneSwarm anonymous filesharing system , 2011, CCS '11.
[3] Hai Jin,et al. Distributed agent-based real time network intrusion forensics system architecture design , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[4] Mark Pollitt,et al. A History of Digital Forensics , 2010, IFIP Int. Conf. Digital Forensics.
[5] Andreas Haeberlen,et al. Practical robust localization over large-scale 802.11 wireless networks , 2004, MobiCom '04.
[6] Fabrice Labeau,et al. Discrete Time Signal Processing , 2004 .
[7] Brian Neil Levine,et al. Strengthening forensic investigations of child pornography on P2P networks , 2010, Co-NEXT '10.
[8] Sujeet Shenoi,et al. Extracting Concealed Data from BIOS Chips , 2005, IFIP Int. Conf. Digital Forensics.
[9] Joe Grand,et al. A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..
[10] Ricci S. C. Ieong,et al. FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..
[11] H. Marshall Jarrett,et al. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations , 1979 .
[12] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[13] Sarah Mocas,et al. Building theoretical underpinnings for digital forensics research , 2004, Digit. Investig..
[14] Brian Neil Levine,et al. Effective Digital Forensics Research Is Investigator-Centric , 2011, HotSec.
[15] Daniel B. Faria. Modeling Signal Attenuation in IEEE 802.11 Wireless LANs-Vol. 1 , 2022 .
[16] Azizah Bt Abdul Manaf,et al. Digital Evidence Retrieval and Forensic Analysis on Gambling Machine , 2009, ICDF2C.
[17] Srihari Nelakuditi,et al. SpinLoc: spin once to know your location , 2012, HotMobile '12.
[18] Sujeet Shenoi,et al. Forensic Analysis of BIOS Chips , 2006, IFIP Int. Conf. Digital Forensics.
[19] Phillip G. Bradford,et al. Developing a proactive digital forensics system , 2007 .
[20] Marcus K. Rogers,et al. A cyber forensics ontology: Creating a new approach to studying cyber forensics , 2006, Digit. Investig..
[21] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[22] T.S. Rappaport,et al. Radio path loss and penetration loss measurements in and around homes and trees at 5.85 GHz , 1998, IEEE Antennas and Propagation Society International Symposium. 1998 Digest. Antennas: Gateways to the Global Network. Held in conjunction with: USNC/URSI National Radio Science Meeting (Cat. No.98CH36.
[23] R. Dworkin. Reasonable Expectation of Privacy , 2014 .
[24] Eugene H. Spafford,et al. Categories of digital investigation analysis techniques based on the computer history model , 2006, Digit. Investig..
[25] Paul Burke,et al. Xbox Forensics , 2006, J. Digit. Forensic Pract..
[26] Tao Xiang,et al. When Digital Forensic Research Meets Laws , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[27] Stephen G. MacDonell,et al. Software Forensics: Extending Authorship Analysis Techniques to Computer Programs , 2002 .
[28] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[29] Nasir D. Memon,et al. Digital Forensics , 2009, IEEE Secur. Priv..
[30] Patrick Juola,et al. Authorship Attribution for Electronic Documents , 2006, IFIP Int. Conf. Digital Forensics.
[31] Sebastian Thrun,et al. Sub-meter indoor localization in unmodified environments with inexpensive sensors , 2010, 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[32] Dr. Ren Wei. A Framework of Distributed Agent-based Network Forensics System , 2004 .