Social snapshots: digital forensics for online social networks
暂无分享,去创建一个
Edgar R. Weippl | Gilbert Wondracek | Manuel Leithner | Sebastian Schrittwieser | Markus Huber | Martin Mulazzani | E. Weippl | S. Schrittwieser | Markus Huber | M. Mulazzani | Manuel Leithner | Gilbert Wondracek
[1] Christopher Krügel,et al. A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.
[2] Kevvie Fowler. SQL Server Forensic Analysis , 2008 .
[3] Edgar R. Weippl,et al. Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam , 2011, IEEE Internet Computing.
[4] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[5] Michael Cohen,et al. PyFlag - An advanced network forensic framework , 2008, Digit. Investig..
[6] Hany Farid,et al. Digital image authentication from thumbnails , 2010, Electronic Imaging.
[7] Nasir D. Memon,et al. Digital Forensics , 2009, IEEE Secur. Priv..
[8] Mark John Taylor,et al. Forensic investigation of cloud computing systems , 2011, Netw. Secur..
[9] Roy H. Campbell,et al. Forenscope: a framework for live forensics , 2010, ACSAC '10.
[10] Christoph Wegener,et al. Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[11] Brian D. Carrier,et al. File System Forensic Analysis , 2005 .
[12] Xiaohui Liang,et al. Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.
[13] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[14] Matt Bishop,et al. Live Analysis: Progress and Challenges , 2009, IEEE Security & Privacy.