|
Conferences in DBLP
(imf) 2009 (conf/imf/2009)
Overcast: Forensic Discovery in Cloud Environments. [Citation Graph (, )][DBLP]
Experiences with the NoAH Honeynet Testbed to Detect new Internet Worms. [Citation Graph (, )][DBLP]
Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team. [Citation Graph (, )][DBLP]
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. [Citation Graph (, )][DBLP]
From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. [Citation Graph (, )][DBLP]
Fast User Classifying to Establish Forensic Analysis Priorities. [Citation Graph (, )][DBLP]
The Forensic Image Generator Generator (Forensig2). [Citation Graph (, )][DBLP]
Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. [Citation Graph (, )][DBLP]
Technique to Interrogate an Image of RAM. [Citation Graph (, )][DBLP]
An Automated User Transparent Approach to log Web URLs for Forensic Analysis. [Citation Graph (, )][DBLP]
Self-Forensics Through Case Studies of Small-to-Medium Software Systems. [Citation Graph (, )][DBLP]
Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts. [Citation Graph (, )][DBLP]
A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. [Citation Graph (, )][DBLP]
|