SSL based Webmail Forensic Engine
暂无分享,去创建一个
T. Manesh | Abdalla A Alameen | M MohemmedSha | A MohamedMustaqAhmed | M. Y. Mohamed Yacoab | K BhadranV | Abraham Varghese | Abraham Varghese | A. Alameen | M. Yacoab | T. Manesh | M. MohemmedSha | A. MohamedMustaqAhmed | K. BhadranV.
[1] WenQi Wang,et al. The Research on Email Forensic Based Network , 2009, 2009 First International Conference on Information Science and Engineering.
[2] Pavel Celeda,et al. HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting , 2016, EURASIP J. Inf. Secur..
[3] Khidir M. Ali. Digital Forensics Best Practices and Managerial Implications , 2012, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.
[4] Abeer E. W. Eldewahi,et al. SSL/TLS attacks: Analysis and evaluation , 2015, 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE).
[5] Page Manesh,et al. Network Forensic Investigation of HTTPS Protocol , 2013 .
[6] Gail-Joon Ahn,et al. Towards comprehensive and collaborative forensics on email evidence , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[7] T. Manesh,et al. Forensic investigation framework for P2P protocol , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[8] Sanjay Agrawal,et al. A hybrid approach for spam filtering using support vector machine and artificial immune system , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).
[9] Hong Guo,et al. Analysis of Email Header for Forensics Purpose , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[10] Paul Sant,et al. The Forensics Edge Management System: A Concept and Design , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[11] Lili Xie,et al. A forensics tool of Foxmail client , 2014, The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014).
[12] Lili Xie,et al. An Email Forensics Analysis Method Based on Social Network Analysis , 2013, 2013 International Conference on Cloud Computing and Big Data.
[13] T. Manesh,et al. VoIP Forensic Analyzer , 2016 .
[14] Pavel Celeda,et al. Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[15] Rolf Oppliger. SSL and TLS: Theory and Practice , 2009 .
[16] D. Lalitha Bhaskari,et al. A Stylometric Investigation Tool for Authorship Attribution in E-Mail Forensics , 2014 .
[17] Wang Hui,et al. Network Data Packet Capture and Protocol Analysis on Jpcap-Based , 2009, 2009 International Conference on Information Management, Innovation Management and Industrial Engineering.
[18] Lili Xie,et al. A forensic analysis solution of the email network based on email contents , 2015, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[19] T. Manesh,et al. Forensic Framework for Skype Communication , 2016 .
[20] Hossain Shahriar,et al. A Comparative Study of Email Forensic Tools , 2015 .
[21] T. Manesh,et al. An Improved Approach towards Network Forensic Investigation of HTTP and FTP Protocols , 2011 .