-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P. Anderson Co.; April
-
Anderson James P. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co.; April 1980.
-
(1980)
Technical Report
-
-
Anderson James, P.1
-
2
-
-
85084162101
-
Providing process origin information to aid in network traceback
-
Monterey. CA; July CERIAS TR 2002-22
-
Buchholz Florian, Shields Clay. Providing process origin information to aid in network traceback. In: Proceedings of the 2002 USENIX annual technical conference. Monterey, CA; July 2002. CERIAS TR 2002-22.
-
(2002)
Proceedings of the 2002 USENIX Annual Technical Conference
-
-
Florian, B.1
Clay, S.2
-
3
-
-
10644285176
-
Providing process origin information to aid in computer forensic investigations
-
Buchholz Florian, Shields Clay. Providing process origin information to aid in computer forensic investigations. Journal of Computer Security September 2004;12(5):753-76.
-
(2004)
Journal of Computer Security September
, vol.12
, Issue.5
, pp. 753-776
-
-
Florian, B.1
Clay, S.2
-
8
-
-
0036351977
-
A recursive session token protocol for use in computer forensics and TCP traceback
-
June
-
Carrier B, Shields C. A recursive session token protocol for use in computer forensics and TCP traceback. Proceedings of the IEEE infocomm 2002; June 2002.
-
(2002)
Proceedings of the IEEE Infocomm 2002
-
-
Carrier, B.1
Shields, C.2
-
9
-
-
7544240929
-
Defining event reconstruction of digital crime scenes
-
CERIAS TR 2004-37
-
Carrier Brian D, Spafford Eugene H. Defining event reconstruction of digital crime scenes. Journal of Forensic Sciences 2004;49(6):11. CERIAS TR 2004-37.
-
(2004)
Journal of Forensic Sciences
, vol.49
, Issue.6
, pp. 11
-
-
Carrier Brian, D.1
Spafford Eugene, H.2
-
14
-
-
0013393580
-
Location-based authentication: Grounding Cyberspace for better security
-
ACM Press/Addison-Wesley Publishing Co
-
Denning Dorothy E, MacDoran Peter F. Location-based authentication: grounding Cyberspace for better security. In: Internet besieged: countering Cyberspace scofflaws. ACM Press/Addison-Wesley Publishing Co; 1998. p. 167-74.
-
(1998)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 167-174
-
-
Denning Dorothy, E.1
MacDoran Peter, F.2
-
17
-
-
10644255177
-
A toolkit for modeling and compressing audit data
-
COAST, Purdue University; COAST TR 98-20
-
Flack Chapman J, Atallah Mikhail. A toolkit for modeling and compressing audit data. Technical report, COAST, Purdue University; 1998. COAST TR 98-20.
-
(1998)
Technical Report
-
-
Flack Chapman, J.1
Mikhail, A.2
-
21
-
-
10644256938
-
Law enforcement tools and technologies for investigating cyber attacks: A national needs assessment
-
Dartmouth College
-
Institute for Security Technology Studies. Law enforcement tools and technologies for investigating cyber attacks: a national needs assessment. Technical report, Dartmouth College; 2002.
-
(2002)
Technical Report
-
-
-
22
-
-
33645762914
-
Law enforcement tools and technologies for investigating cyber attacks: Gap analysis report
-
Dartmouth College; February
-
Institute for Security Technology Studies. Law enforcement tools and technologies for investigating cyber attacks: gap analysis report. Technical report, Dartmouth College; February 2004.
-
(2004)
Technical Report
-
-
-
29
-
-
1942425715
-
-
Norwood, MA: Artech House
-
Mohay G, Anderson A, Collie B, De Vel O, McKemmish R. Computer and intrusion forensics. Norwood, MA: Artech House; 2003.
-
(2003)
Computer and Intrusion Forensics
-
-
Mohay, G.1
Anderson, A.2
Collie, B.3
De Vel, O.4
McKemmish, R.5
-
31
-
-
0001300585
-
Plan 9 from Bell Labs
-
Pike Rob, Presotto Dave, Dorward Scan, Flandrena Bob, Thompson Ken, Trickey Howard, et al. Plan 9 from Bell Labs. Computing Systems Summer 1995;8(3):221-54.
-
(1995)
Computing Systems Summer
, vol.8
, Issue.3
, pp. 221-254
-
-
Rob, P.1
Dave, P.2
Scan, D.3
Bob, F.4
Ken, T.5
Howard, T.6
-
33
-
-
1242286401
-
The future of computer forensics: A needs analysis survey
-
Rogers MK, Seigfried K. The future of computer forensics: a needs analysis survey. Computers & Security 2004;26.
-
(2004)
Computers & Security
, pp. 26
-
-
Rogers, M.K.1
Seigfried, K.2
-
34
-
-
0042352263
-
Deciding when to forget in the elephant file system
-
Santry Douglas S, Feeley Michael J, Hutchinson Norman C, Veitch Alistair C, Carton Ross W, Ofir Jacob. Deciding when to forget in the elephant file system. In: Symposium on operating systems principles; 1999. p. 110-23.
-
(1999)
Symposium on Operating Systems Principles
, pp. 110-123
-
-
Santry Douglas, S.1
Feeley Michael, J.2
Hutchinson Norman, C.3
Veitch Alistair, C.4
Carton Ross, W.5
Jacob, O.6
-
37
-
-
10644286071
-
-
The forensic toolit. 〈http://www.accessdata.com/Product04_Overview.htm〉.
-
The Forensic Toolit
-
-
-
39
-
-
84960561455
-
On computable numbers, with an application to the entscheidungsproblem
-
David M, editor. Hewlett, NY: Raven Press; [Reprinted in The Undecidable, 1965]
-
Turing AM. On computable numbers, with an application to the entscheidungsproblem. In: David M, editor. Proceedings of London Mathematical Society Series 2, vol. 42. Hewlett, NY: Raven Press; 1937. p. 230-65. [Reprinted in The Undecidable, 1965].
-
(1937)
Proceedings of London Mathematical Society Series 2
, vol.42
, pp. 230-265
-
-
Turing, A.M.1
-
40
-
-
84960612623
-
Correction to: On computable numbers, with an application to the entscheidungsproblem
-
Turing AM. Correction to: on computable numbers, with an application to the entscheidungsproblem. Proceedings of London Mathematical Society Series 2 1938;43:544-6.
-
(1938)
Proceedings of London Mathematical Society Series 2
, vol.43
, pp. 544-546
-
-
Turing, A.M.1
-
42
-
-
10644223048
-
A tool for network monitoring, access control, and for setting up booby traps
-
September
-
Venema Wietse. Tcp wrapper, a tool for network monitoring, access control, and for setting up booby traps. Proceedings of 1992 USENIX security symposium September; 1992.
-
(1992)
Proceedings of 1992 USENIX Security Symposium
-
-
Wietse, V.1
Wrapper, T.2
|