The Validity for Trusted Forensics Based on Probability
暂无分享,去创建一个
[1] Jin Xian-li. The methods of trusted forensic based on waterfall model , 2009 .
[2] Xiangliang Zhang,et al. Processing of massive audit data streams for real-time anomaly intrusion detection , 2008, Comput. Commun..
[3] Deborah A. Frincke,et al. Specifying digital forensics: A forensics policy approach , 2007 .
[4] Tang Juan,et al. Proving Method for Validity of Computer Data Forensics , 2009 .
[5] Pascal Yim,et al. Mathematical programming approach to the Petri nets reachability problem , 2007, Eur. J. Oper. Res..
[6] W. H. Williams,et al. Probability Theory and Mathematical Statistics , 1964 .
[7] Mourad Debbabi,et al. Forensic analysis of logs: Modeling and verification , 2007, Knowl. Based Syst..
[8] Mark Taylor,et al. The legal aspects of corporate computer forensic investigations , 2007, Comput. Law Secur. Rev..
[9] Claudio Soriente,et al. Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..
[10] Martin S. Olivier,et al. On metadata context in Database Forensics , 2009, Digit. Investig..
[11] James S. Harris,et al. Probability theory and mathematical statistics , 1998 .