Digital Forensics and Cyber Crime
暂无分享,去创建一个
[1] Jon Postel,et al. Transmission Control Protocol , 1981, RFC.
[2] Sherali Zeadally,et al. Network Forensics: An Analysis of Techniques, Tools, and Trends , 2012, Computer.
[3] Rajdeep Niyogi,et al. Network forensic frameworks: Survey and research challenges , 2010, Digit. Investig..
[4] Simson L. Garfinkel,et al. Using purpose-built functions and block hashes to enable small block and sub-file forensics , 2010, Digit. Investig..
[5] David A. McGrew,et al. An Interface and Algorithms for Authenticated Encryption , 2008, RFC.
[6] Markus Jakobsson,et al. What Instills Trust? A Qualitative Study of Phishing , 2007, Financial Cryptography.
[7] Erik Hjelmvik,et al. Statistical Protocol IDentification with SPID: Preliminary Results , 2009 .
[8] Jon Postel,et al. Internet Protocol , 1981, RFC.
[9] Ondrej Rysavý,et al. Fast RTP Detection and Codecs Classification in Internet Traffic , 2014, J. Digit. Forensics Secur. Law.
[10] Li-Jen Shannon,et al. A Case Study: Applying Critical Thinking Skills to Computer Science and Technology , 2012 .
[11] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[12] Bill Fenner,et al. The sockets networking API , 2004 .
[13] Sarang Dharmapurikar,et al. Robust TCP Stream Reassembly in the Presence of Adversaries , 2005, USENIX Security Symposium.
[14] Stefan A. Robila,et al. Societal Aspects of Phishing , 2006, 2006 IEEE International Symposium on Technology and Society.
[15] Michael Cohen,et al. PyFlag - An advanced network forensic framework , 2008, Digit. Investig..
[16] M. Freiermuth. Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting , 2011 .
[17] Rui Chen,et al. Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email , 2012, IEEE Transactions on Professional Communication.
[18] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.0 , 1996, RFC.