The Forensics Edge Management System: A Concept and Design
暂无分享,去创建一个
[1] Chen Lin,et al. Automated Analysis of Multi-Source Logs for Network Forensics , 2009, 2009 First International Workshop on Education Technology and Computer Science.
[2] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[3] Christopher Hargreaves,et al. An automated timeline reconstruction approach for digital forensic investigations , 2012 .
[4] Roy H. Campbell,et al. Secure smart homes using Jini and UIUC SESAME , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[5] Y. S. Lohith,et al. 6PANview: Application performance conscious network monitoring for 6LoWPAN based WSNs , 2012, 2012 National Conference on Communications (NCC).
[6] David W. J. Stringer-Calvert,et al. Digital Evidence , 2002, Commun. ACM.
[7] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[8] Christoph P. Mayer. Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .
[9] Simson L. Garfinkel,et al. Digital forensics research: The next 10 years , 2010, Digit. Investig..
[10] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[11] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[12] Ali Dehghantanha,et al. A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS , 2014 .
[13] Stephen J Esposito. Analysis of Forensic Super Timelines , 2012 .
[14] Jacky Hartnett,et al. Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .
[15] David Preston,et al. A New Approach of Digital Forensic Model for Digital Forensic Investigation , 2011 .
[16] S. V. R. Anand,et al. 6PANview: A network monitoring system for the “Internet of Things” , 2011 .
[17] Rodney McKemmish,et al. When is Digital Evidence Forensically Sound? , 2008, IFIP Int. Conf. Digital Forensics.
[18] Ling Zhihao,et al. The research and implement of smart home system based on Internet of Things , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[19] Eugene Libster,et al. A proposal for an integrated memory acquisition mechanism , 2008, OPSR.
[20] R. Sridhar,et al. Intrusion detection in RFID systems , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[21] Joe Grand,et al. A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..
[22] Fabio Marturana,et al. A Machine Learning-based Triage methodology for automated categorization of digital media , 2013, Digit. Investig..
[23] K. Takeda,et al. A Product Based Security Model for Smart Home Appliances , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[24] Yoginder S. Dandass,et al. Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model , 2012, Comput. Inf. Sci..
[25] Nasir D. Memon,et al. ForNet: A Distributed Forensics Network , 2003, MMM-ACNS.
[26] Paul Turner,et al. Forensic Computing Theory & Practice: Towards developing a methodology for a standardised approach to Computer misuse , 2003, Australian Computer, Network & Information Forensics Conference.
[27] Golden G. Richard,et al. FACE: Automated digital evidence discovery and correlation , 2008, Digit. Investig..
[28] Mark Pollitt,et al. A History of Digital Forensics , 2010, IFIP Int. Conf. Digital Forensics.