메뉴 건너뛰기




Volumn 2, Issue 3, 2005, Pages 193-200

Generalizing sources of live network evidence

Author keywords

Cyber forensics; Live network acquisition; Live network evidence; Live network sources; Network forensics; NFAT

Indexed keywords

COMPUTATIONAL COMPLEXITY; DATA ACQUISITION; MATHEMATICAL MODELS; TELECOMMUNICATION TRAFFIC;

EID: 24344472708     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2005.08.001     Document Type: Article
Times cited : (29)

References (19)
  • 3
    • 3042768157 scopus 로고    scopus 로고
    • Defining digital forensic examination and analysis tools using abstraction layers
    • Brian Carrier Defining digital forensic examination and analysis tools using abstraction layers International Journal of Digital Evidence Winter 2003
    • (2003) International Journal of Digital Evidence
    • Brian, C.1
  • 4
    • 3042731401 scopus 로고    scopus 로고
    • A hardware-based memory acquisition procedure for digital investigations
    • Brian Carrier, and Joe Grand A hardware-based memory acquisition procedure for digital investigations Digital Investigation 1 1 2004
    • (2004) Digital Investigation , vol.1 , Issue.1
    • Brian, C.1    Joe, G.2
  • 5
    • 3042852281 scopus 로고    scopus 로고
    • Network traffic as a source of evidence: Tool strengths, weaknesses, and future needs
    • Eoghan Casey Network traffic as a source of evidence: tool strengths, weaknesses, and future needs Digital Investigation 1 1 2004
    • (2004) Digital Investigation , vol.1 , Issue.1
    • Eoghan, C.1
  • 7
    • 10644254384 scopus 로고    scopus 로고
    • Tool review - Remote forensic preservation and examination tools
    • Eoghan Casey, and Aaron Stanley Tool review - remote forensic preservation and examination tools Digital Investigation 1 4 2004
    • (2004) Digital Investigation , vol.1 , Issue.4
    • Eoghan, C.1    Aaron, S.2
  • 8
    • 4544267383 scopus 로고    scopus 로고
    • Formalization of computer input and output: The Hadley model
    • Matthew Gerber, and John Leeson Formalization of computer input and output: the Hadley model Digital Investigation 1 3 2004
    • (2004) Digital Investigation , vol.1 , Issue.3
    • Matthew, G.1    John, L.2
  • 10
    • 14544274055 scopus 로고    scopus 로고
    • The internet is the computer: The role of forensics in bridging the digital and physical divide
    • Erin E. Kenneally The internet is the computer: the role of forensics in bridging the digital and physical divide Digital Investigation 2 1 2005
    • (2005) Digital Investigation , vol.2 , Issue.1
    • Kenneally Erin, E.1
  • 11
    • 3042774608 scopus 로고    scopus 로고
    • Building theoretical underpinnings for digital forensic research
    • Sarah Mocas Building theoretical underpinnings for digital forensic research Digital Investigation 1 1 2004
    • (2004) Digital Investigation , vol.1 , Issue.1
    • Sarah, M.1
  • 13
    • 4544344688 scopus 로고    scopus 로고
    • Deploying forensic tools via PXE
    • Owen O'Connor Deploying forensic tools via PXE Digital Investigation 1 3 2004
    • (2004) Digital Investigation , vol.1 , Issue.3
    • Owen, O.1
  • 15
    • 84993047821 scopus 로고    scopus 로고
    • Downloads, logs, and captures: Evidence from cyberspace
    • Peter Sommer Downloads, logs, and captures: evidence from cyberspace Journal of Financial Crime 1997
    • (1997) Journal of Financial Crime
    • Peter, S.1
  • 16
    • 0033295914 scopus 로고    scopus 로고
    • Intrusion detection systems as evidence
    • Peter Sommer Intrusion detection systems as evidence Computer Networks 31 1999
    • (1999) Computer Networks , vol.31
    • Peter, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.