Understanding Network Forensics Analysis in an Operational Environment
暂无分享,去创建一个
[1] Anja Feldmann,et al. An Assessment of Overt Malicious Activity Manifest in Residential Networks , 2011, DIMVA.
[2] Xenofontas A. Dimitropoulos,et al. Shedding Light on Log Correlation in Network Forensics Analysis , 2012, DIMVA.
[3] Ravishankar K. Iyer,et al. Analysis of security data from a large computing organization , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[4] Kang G. Shin,et al. Detection of botnets using combined host- and network-level information , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[5] Xenofontas A. Dimitropoulos,et al. Detecting, validating and characterizing computer infections in the wild , 2011, IMC '11.
[6] Stefan Saroiu,et al. Measurement and Analysis of Spyware in a University Environment , 2004, NSDI.
[7] Brian Hernacki,et al. Emerging threats , 2005, WORM '05.
[8] Jesus Mena,et al. Investigative Data Mining for Security and Criminal Detection , 2002 .
[9] Farnam Jahanian,et al. Shades of grey: On the effectiveness of reputation-based “blacklists” , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[10] Simson L. Garfinkel,et al. Automating Disk Forensic Processing with SleuthKit, XML and Python , 2009, 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering.
[11] Michael K. Reiter,et al. Traffic Aggregation for Malware Detection , 2008, DIMVA.
[12] Aleksandar Kuzmanovic,et al. Unconstrained endpoint profiling (googling the internet) , 2008, SIGCOMM '08.
[13] Simson L. Garfinkel,et al. Forensic feature extraction and cross-drive analysis , 2006, Digit. Investig..
[14] Golden G. Richard,et al. FACE: Automated digital evidence discovery and correlation , 2008, Digit. Investig..