|
Conferences in DBLP
(imf) 2008 (conf/imf/2008)
New Challenges for IT-Security Research in ITC (Keynote). [Citation Graph (, )][DBLP]
Incident Management and Forensics Put in Context (Invited). [Citation Graph (, )][DBLP]
Investigations and Prosecution in Cases of Computer Crime (Invited). [Citation Graph (, )][DBLP]
Network Infrastructure Forensics (Invited). [Citation Graph (, )][DBLP]
A Forensic Computing Framework to Fit Any Legal System. [Citation Graph (, )][DBLP]
Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments. [Citation Graph (, )][DBLP]
File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis. [Citation Graph (, )][DBLP]
Attacking Test and Online Forensics in IPv6 Networks. [Citation Graph (, )][DBLP]
Live Forensic Acquisition as Alternative to Traditional Forensic Process. [Citation Graph (, )][DBLP]
Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. [Citation Graph (, )][DBLP]
Network Flow Security Baselining. [Citation Graph (, )][DBLP]
Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms. [Citation Graph (, )][DBLP]
Building a State Tracing Linux Kernel. [Citation Graph (, )][DBLP]
Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. [Citation Graph (, )][DBLP]
|