The SCEAS System
Navigation Menu

Conferences in DBLP

(imf)
2009 (conf/imf/2009)


  1. Overcast: Forensic Discovery in Cloud Environments. [Citation Graph (, )][DBLP]


  2. Experiences with the NoAH Honeynet Testbed to Detect new Internet Worms. [Citation Graph (, )][DBLP]


  3. Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team. [Citation Graph (, )][DBLP]


  4. Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. [Citation Graph (, )][DBLP]


  5. From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. [Citation Graph (, )][DBLP]


  6. Fast User Classifying to Establish Forensic Analysis Priorities. [Citation Graph (, )][DBLP]


  7. The Forensic Image Generator Generator (Forensig2). [Citation Graph (, )][DBLP]


  8. Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. [Citation Graph (, )][DBLP]


  9. Technique to Interrogate an Image of RAM. [Citation Graph (, )][DBLP]


  10. An Automated User Transparent Approach to log Web URLs for Forensic Analysis. [Citation Graph (, )][DBLP]


  11. Self-Forensics Through Case Studies of Small-to-Medium Software Systems. [Citation Graph (, )][DBLP]


  12. Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts. [Citation Graph (, )][DBLP]


  13. A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002