Evidential structures and metrics for network forensics
暂无分享,去创建一个
David J. Parish | John N. Whitley | Ahmad Roshidi Amran | Raphael C. W. Phan | J. Whitley | R. Phan | D. Parish | A. Amran
[1] Brandon Shirley,et al. A Model for Covert Botnet Communication in a Private Subnet , 2008, Networking.
[2] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[3] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[4] Reijo Savola,et al. Towards a taxonomy for information security metrics , 2007, QoP '07.
[5] Andrew Jaquith. Security Metrics: Replacing Fear, Uncertainty, and Doubt , 2007 .
[6] Yoichi Shinoda,et al. Design Issues of an Isolated Sandbox Used to Analyze Malwares , 2007, IWSEC.
[7] K. Clark,et al. Security risk metrics: fusing enterprise objectives and vulnerabilities , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[8] Wouter Joosen,et al. Using Security Patterns to Combine Security Metrics , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[9] Reijo Savola,et al. A Novel Security Metrics Taxonomy for R&D Organisations , 2008, ISSA.
[10] Keith W. Ross,et al. Computer networking - a top-down approach featuring the internet , 2000 .
[11] Deborah A. Frincke,et al. A Theoretical Framework for Organizational Network Forensic Readiness , 2007, J. Comput..
[12] Marianne Swanson,et al. Security metrics guide for information technology systems , 2003 .
[13] Jan H. P. Eloff,et al. Applying Machine Trust Models to Forensic Investigations , 2006, IFIP Int. Conf. Digital Forensics.
[14] Ruibin Gong,et al. Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework , 2005, Int. J. Digit. EVid..
[15] Axel W. Krings,et al. A Formalization of Digital Forensics , 2004, Int. J. Digit. EVid..