The SCEAS System
Navigation Menu

Conferences in DBLP

(imf)
2008 (conf/imf/2008)


  1. New Challenges for IT-Security Research in ITC (Keynote). [Citation Graph (, )][DBLP]


  2. Incident Management and Forensics Put in Context (Invited). [Citation Graph (, )][DBLP]


  3. Investigations and Prosecution in Cases of Computer Crime (Invited). [Citation Graph (, )][DBLP]


  4. Network Infrastructure Forensics (Invited). [Citation Graph (, )][DBLP]


  5. A Forensic Computing Framework to Fit Any Legal System. [Citation Graph (, )][DBLP]


  6. Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments. [Citation Graph (, )][DBLP]


  7. File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis. [Citation Graph (, )][DBLP]


  8. Attacking Test and Online Forensics in IPv6 Networks. [Citation Graph (, )][DBLP]


  9. Live Forensic Acquisition as Alternative to Traditional Forensic Process. [Citation Graph (, )][DBLP]


  10. Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. [Citation Graph (, )][DBLP]


  11. Network Flow Security Baselining. [Citation Graph (, )][DBLP]


  12. Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms. [Citation Graph (, )][DBLP]


  13. Building a State Tracing Linux Kernel. [Citation Graph (, )][DBLP]


  14. Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002