메뉴 건너뛰기




Volumn , Issue , 2007, Pages 96-101

Visualization and management of digital forensics data

Author keywords

Computer forensics; Computer security; Data mining; Human perception; Visualization

Indexed keywords

COMPUTER SCIENCE; DATA MINING; DATA VISUALIZATION; INFORMATION TECHNOLOGY; MAN MACHINE SYSTEMS;

EID: 34748845758     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1231047.1231068     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 1
    • 33745196965 scopus 로고    scopus 로고
    • Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance Program
    • Barbin, Douglas. "Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance Program." Information Systems Control Journal, vol. 3, 2002.
    • (2002) Information Systems Control Journal , vol.3
    • Barbin, D.1
  • 2
    • 34748887055 scopus 로고    scopus 로고
    • Business Wire. Strong Demand for Log Data Management Solutions Fuels LogLogic's First Canadian Seminar., p.1, 2005.
    • Business Wire. "Strong Demand for Log Data Management Solutions Fuels LogLogic's First Canadian Seminar.", p.1, 2005.
  • 3
    • 34748922172 scopus 로고    scopus 로고
    • Caldwell, Cindy, Jeannie P. Pray, Susan B. SanFilippo, KimPhillips, Angie J. French, Elizabeth Fuller, Frank Wosnick, Michael Toscano and Isolina SalgadoToner. New Horizons Classroom Learning: Microsoft Project. 2003.
    • Caldwell, Cindy, Jeannie P. Pray, Susan B. SanFilippo, KimPhillips, Angie J. French, Elizabeth Fuller, Frank Wosnick, Michael Toscano and Isolina SalgadoToner. New Horizons Classroom Learning: Microsoft Project. 2003.
  • 4
    • 34748849158 scopus 로고    scopus 로고
    • Detection of Malicious Code. Intrusions, and Anomalous Activities Workshop
    • The National Security Council, The Office of Science & Technology Policy and The Department of Energy. 3 May
    • Cohen, Michael, L and Jeffery I. Sands. "Report of the Reporting and Analysis Track." Detection of Malicious Code. Intrusions, and Anomalous Activities Workshop.1999.The National Security Council, The Office of Science & Technology Policy and The Department of Energy. 3 May 2006. 〈http:silkroad.com/papers/pdf/NSC-DOE-OSTP_report_1999.pdf〉;.
    • (1999) Report of the Reporting and Analysis Track
    • Cohen, M.L.1    Sands, J.I.2
  • 5
    • 33745202013 scopus 로고    scopus 로고
    • Improving the Computer Forensic Analysis Process through Visualization
    • February
    • Erbacher, R. and Teerlink, S. "Improving the Computer Forensic Analysis Process through Visualization." Communications of the ACM. February 2006. Vol. 49.,No.2.
    • (2006) Communications of the ACM , vol.49 , Issue.2
    • Erbacher, R.1    Teerlink, S.2
  • 9
    • 34748831533 scopus 로고    scopus 로고
    • Giuseppini, Gabriele and Burnett, Mark. Microsoft Log Parser Toolkit. Syngress, Rockland, 2004.
    • Giuseppini, Gabriele and Burnett, Mark. Microsoft Log Parser Toolkit. Syngress, Rockland, 2004.
  • 11
    • 0003993827 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory, 〈〉
    • MIT Lincoln Laboratory. "1998 DARPA Intrusion Detection Evaluation." 〈http://www.ll.mit.edu/IST/ideval.docs/docs_index. html〉
    • (1998) DARPA Intrusion Detection Evaluation
  • 12
    • 34748859643 scopus 로고    scopus 로고
    • Network Intelligence, NetAPP and Decru Announce End-to-End Secure Log Management Lifecycle Solution; Tunkey Solution Manages, Stores, and Secures Sensitive Log data. Business Wire, p.1, 2005.
    • "Network Intelligence, NetAPP and Decru Announce End-to-End Secure Log Management Lifecycle Solution; Tunkey Solution Manages, Stores, and Secures Sensitive Log data." Business Wire, p.1, 2005.
  • 13
    • 34748829047 scopus 로고    scopus 로고
    • Purple Insight. 3 May 2006. 〈http://www.purpleinsight.com/ products/in.dex/shtml〉.
    • Purple Insight. 3 May 2006. 〈http://www.purpleinsight.com/ products/in.dex/shtml〉.
  • 14
    • 34748842506 scopus 로고    scopus 로고
    • Java Cryptography Extension
    • Sun Microsystems, Inc, 〈〉
    • Sun Microsystems, Inc. "Java Cryptography Extension. (JCE) for the Java 2 SDK, v. 14" 〈http://java.sun.com/products/ice/index-14. html〉
    • (JCE) for the Java 2 SDK , vol.14
  • 15
    • 34548078533 scopus 로고    scopus 로고
    • Agile Web Development with Rails: A Pragmatic Guide
    • Raleigh
    • Thomas, Dave and Hansson, David. Agile Web Development with Rails: A Pragmatic Guide. Pragmatic Programmers LLC, Raleigh, 2005.
    • (2005) Pragmatic Programmers LLC
    • Thomas, D.1    Hansson, D.2
  • 16
    • 34948892521 scopus 로고    scopus 로고
    • Illuminating the Path: The Research and Development Agenda for Visual Analytics
    • Thomas, J. and Cook, K, editors
    • Thomas, J. and Cook, K. (editors). "Illuminating the Path: the Research and Development Agenda for Visual Analytics." IEEE Computer Society Press, 2005.
    • (2005) IEEE Computer Society Press
  • 18
    • 0036495060 scopus 로고    scopus 로고
    • Recent Developments in Parallel and Distributed Data Mining
    • Zaki, M.J., and Pan,Y. "Recent Developments in Parallel and Distributed Data Mining", Distributed and Parallel Databases, 11, 123-127. 2002.
    • (2002) Distributed and Parallel Databases , vol.11 , pp. 123-127
    • Zaki, M.J.1    Pan, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.