暂无分享,去创建一个
[1] Mark Scanlon. Battling the digital forensic backlog through data deduplication , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).
[2] Wouter Joosen,et al. Mobile device fingerprinting considered harmful for risk-based authentication , 2015, EUROSEC.
[3] Victor Olifer,et al. Computer Networks: Principles, Technologies and Protocols for Network Design , 2006 .
[4] M. Tahar Kechadi,et al. Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service , 2015, Comput. Secur..
[5] Jason Moore,et al. Network and device forensic analysis of Android social-messaging applications , 2015, Digit. Investig..
[6] Bill Nelson,et al. Guide to Computer Forensics and Investigations , 2003 .
[7] Eoghan Casey,et al. Network traffic as a source of evidence: tool strengths, weaknesses, and future needs , 2004, Digit. Investig..
[8] Alec Yasinsac,et al. Policies to Enhance Computer and Network Forensics , 2001 .
[9] Kim-Kwang Raymond Choo,et al. Impacts of increasing volume of digital forensic data: A survey and future research challenges , 2014, Digit. Investig..
[10] Thomas Engel,et al. Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[11] M. Tahar Kechadi,et al. Overview of the Forensic Investigation of Cloud Services , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[12] Mark Scanlon,et al. A Week in the Life of the Most Popular BitTorrent Swarms , 2010 .
[13] Nhien-An Le-Khac,et al. Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[14] Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data , 2010 .
[15] Lei Chen,et al. IPv6 security and forensics , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).