Quality Assurance for Evidence Collection in Network Forensics
暂无分享,去创建一个
[1] Stephen S. Rappaport,et al. Traffic model and performance analysis for cellular mobile radio telephone systems with prioritized and nonprioritized handoff procedures , 1986, IEEE Transactions on Vehicular Technology.
[2] Kang G. Shin,et al. Persistent dropping: an efficient control of traffic aggregates , 2003, SIGCOMM '03.
[3] Michael S. Greenberg,et al. Network Forensics Analysis , 2002, IEEE Internet Comput..
[4] Eoghan Casey,et al. Network traffic as a source of evidence: tool strengths, weaknesses, and future needs , 2004, Digit. Investig..
[5] G. Conti,et al. Real-time and forensic network data analysis using animated and coordinated visualization , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[6] Karen A. Scarfone,et al. Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response , 2005 .
[7] Wu-chang Fengy,et al. BLUE: A New Class of Active Queue Management Algorithms , 1999 .
[8] Kang G. Shin,et al. The BLUE active queue management algorithms , 2002, TNET.
[9] David A. Maltz,et al. Toward a Framework for Internet Forensic Analysis , 2004 .
[10] 日本電信電話株式会社. NTT technical review , 2003 .