E-Cyborg: The cybercrime evidence finder
暂无分享,去创建一个
[1] Tinghua Wang,et al. Network forensics based on fuzzy logic and expert system , 2009, Comput. Commun..
[2] U. S. Nij. Forensic Examination of Digital Evidence: A Guide for Law Enforcement , 2013 .
[3] Jongin Lim,et al. The Evidence Collection of DoS Attack in WLAN by Using WLAN Forensic Profiling System , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).
[4] Jau-Hwang Wang,et al. Cyber Forensics: Issues and Approaches , 2005 .
[5] Jong-Ho Park,et al. An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time , 2006, ICISC.
[6] Moses Garuba,et al. Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[7] Richard A. Wasniowski. Multi-sensor agent-based intrusion detection system , 2005, InfoSecCD '05.
[8] Erin E. Kenneally,et al. Risk sensitive digital evidence collection , 2005, Digit. Investig..
[9] Tom Killalea,et al. Guidelines for Evidence Collection and Archiving , 2002, RFC.
[10] Tao Li,et al. Dynamical Network Forensics Based on Immune Agent , 2007, Third International Conference on Natural Computation (ICNC 2007).
[11] Jeroen Keppens,et al. Probabilistic abductive computation of evidence collection strategies in crime investigation , 2005, ICAIL '05.
[12] Martin R. Stytz,et al. Security in computing, 3rd ed. [Book Review] , 2003, IEEE Security & Privacy Magazine.
[13] Zhang Jun,et al. MADIDS: a novel distributed IDS based on mobile agent , 2003 .