메뉴 건너뛰기




Volumn 3, Issue 2, 2006, Pages 89-96

Improving evidence acquisition from live network sources

Author keywords

Live network acquisition; Live network evidence; Live network forensics; Network forensics; NFAT

Indexed keywords

COMPACT DISKS; LAW ENFORCEMENT; ONLINE SYSTEMS; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 33745174196     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2006.05.002     Document Type: Article
Times cited : (22)

References (14)
  • 2
    • 3042727237 scopus 로고    scopus 로고
    • Practical approaches to recovering encrypted digital evidence
    • Casey E. Practical approaches to recovering encrypted digital evidence. International Journal of Digital Evidence (Fall 2002)
    • (2002) International Journal of Digital Evidence
    • Casey, E.1
  • 3
    • 3042852281 scopus 로고    scopus 로고
    • Network traffic as a source of evidence: tool strengths, weaknesses, and future needs
    • Casey E. Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digital Investigation 1 1 (2004)
    • (2004) Digital Investigation , vol.1 , Issue.1
    • Casey, E.1
  • 7
    • 10644287636 scopus 로고    scopus 로고
    • Domain name forensics: a systematic approach to investigating an Internet presence
    • No. 3; 2004
    • Nikkel B. Domain name forensics: a systematic approach to investigating an Internet presence. Digital Investigation 1 4 (2004) No. 3; 2004
    • (2004) Digital Investigation , vol.1 , Issue.4
    • Nikkel, B.1
  • 8
    • 24344472708 scopus 로고    scopus 로고
    • Generalizing sources of live network evidence
    • Nikkel B. Generalizing sources of live network evidence. Digital Investigation 2 3 (2005)
    • (2005) Digital Investigation , vol.2 , Issue.3
    • Nikkel, B.1
  • 9
    • 33745143877 scopus 로고    scopus 로고
    • Rekhter Y, Moskowitz B, Karrenberg D, de Groot G. Network Working Group. Request for comments (RFC1597); March 1994.
  • 10
    • 33745128340 scopus 로고    scopus 로고
    • Schneier Bruce, Kelsey J. Secure audit logs to support computer forensics. In: Seventh Usenix security symposium proceedings; 1999.
  • 12
    • 84993047821 scopus 로고    scopus 로고
    • Downloads, logs, and captures: evidence from cyberspace
    • Sommer P. Downloads, logs, and captures: evidence from cyberspace. Journal of Financial Crime (October 1997)
    • (1997) Journal of Financial Crime
    • Sommer, P.1
  • 14
    • 14544294808 scopus 로고    scopus 로고
    • Digital provenance-interpretation, verification and corroboration
    • Turner P. Digital provenance-interpretation, verification and corroboration. Digital Investigation 2 2 (2005)
    • (2005) Digital Investigation , vol.2 , Issue.2
    • Turner, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.