-
1
-
-
40749161685
-
-
Ahmad A, Ruighaver AB. FIRESTORM: exploring the need for a forensic tool for pattern correlation in Windows NT audit logs. Infowar034; 2002.
-
Ahmad A, Ruighaver AB. FIRESTORM: exploring the need for a forensic tool for pattern correlation in Windows NT audit logs. Infowar034; 2002.
-
-
-
-
4
-
-
33847193441
-
-
Buchholz F, Falk C. Design and implementation of Zeitline: a forensic timeline editor. In: Digital forensics research workshop; 2005.
-
Buchholz F, Falk C. Design and implementation of Zeitline: a forensic timeline editor. In: Digital forensics research workshop; 2005.
-
-
-
-
5
-
-
40749087413
-
-
Carrier BD. Open source digital forensics tools: the legal argument. .
-
Carrier BD. Open source digital forensics tools: the legal argument. .
-
-
-
-
6
-
-
33646847862
-
Data mining or knowledge discovery in databases: an overview
-
Auerbach Publications, New York
-
Carbone P.L. Data mining or knowledge discovery in databases: an overview. Data management handbook (1997), Auerbach Publications, New York
-
(1997)
Data management handbook
-
-
Carbone, P.L.1
-
7
-
-
3042768157
-
Defining digital forensic examination and analysis tools using abstraction layers
-
Carrier B. Defining digital forensic examination and analysis tools using abstraction layers. Int J Digit Evid 1 4 (2003)
-
(2003)
Int J Digit Evid
, vol.1
, Issue.4
-
-
Carrier, B.1
-
8
-
-
40749088661
-
-
Cohen W. Fast effective rule induction. In: 12th International conference on machine learning (ICML 95); 1995. p. 115-23.
-
Cohen W. Fast effective rule induction. In: 12th International conference on machine learning (ICML 95); 1995. p. 115-23.
-
-
-
-
9
-
-
84867720924
-
-
Carrier BD, Spafford EH. Automated digital evidence target definition using outlier analysis and existing evidence. In: Digital forensic research workshop (DFRWS), New Orleans, LA; 2005.
-
Carrier BD, Spafford EH. Automated digital evidence target definition using outlier analysis and existing evidence. In: Digital forensic research workshop (DFRWS), New Orleans, LA; 2005.
-
-
-
-
10
-
-
3042727240
-
Error, uncertainty and loss in digital evidence
-
Casey E. Error, uncertainty and loss in digital evidence. Int J Dig Evid 1 2 (2002)
-
(2002)
Int J Dig Evid
, vol.1
, Issue.2
-
-
Casey, E.1
-
11
-
-
7544240929
-
Defining event reconstruction of digital crime scenes
-
Carrier B.D., and Spafford E.H. Defining event reconstruction of digital crime scenes. J Forensic Sci 49 6 (2004) 1291-1298
-
(2004)
J Forensic Sci
, vol.49
, Issue.6
, pp. 1291-1298
-
-
Carrier, B.D.1
Spafford, E.H.2
-
12
-
-
40749122741
-
-
Chan PK, Mahoney MV, Arshad MH. A machine learning approach to anomaly detection. Florida Institute of Technology, Melbourne, FL 32901, USA. Technical report CS-2003-06; 2003.
-
Chan PK, Mahoney MV, Arshad MH. A machine learning approach to anomaly detection. Florida Institute of Technology, Melbourne, FL 32901, USA. Technical report CS-2003-06; 2003.
-
-
-
-
13
-
-
40749139628
-
-
DeVel O. File classification using sub-sequence kernels. In: Digital forensic research workshop (DFRWS'03); 2003.
-
DeVel O. File classification using sub-sequence kernels. In: Digital forensic research workshop (DFRWS'03); 2003.
-
-
-
-
15
-
-
26444565569
-
Finding structure in time
-
Elman J.L. Finding structure in time. Cognit Sci 14 (1990) 179-211
-
(1990)
Cognit Sci
, vol.14
, pp. 179-211
-
-
Elman, J.L.1
-
16
-
-
40749155173
-
-
Goel A, Feng WC, Maier D, Walpole J. Forensix: a robust, high-performance reconstruction system. In: 25th IEEE International Conference on Distributed computing systems workshops; 2005;6(10):155-62.
-
Goel A, Feng WC, Maier D, Walpole J. Forensix: a robust, high-performance reconstruction system. In: 25th IEEE International Conference on Distributed computing systems workshops; 2005;6(10):155-62.
-
-
-
-
17
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
Helman P., and Liepins E.G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans Software Eng 19 (1993) 886-901
-
(1993)
IEEE Trans Software Eng
, vol.19
, pp. 886-901
-
-
Helman, P.1
Liepins, E.G.2
-
20
-
-
33745981119
-
An empirical study of event reconstruction systems
-
Jeyaraman S., and Atallah M.J. An empirical study of event reconstruction systems. Dig Invest 3 (2006) 108-115
-
(2006)
Dig Invest
, vol.3
, pp. 108-115
-
-
Jeyaraman, S.1
Atallah, M.J.2
-
21
-
-
40749117819
-
-
King ST, Chen PM. Backtracking intrusions. In: Proceedings of the 2003 symposium on operating systems (SOSP); October 2003.
-
King ST, Chen PM. Backtracking intrusions. In: Proceedings of the 2003 symposium on operating systems (SOSP); October 2003.
-
-
-
-
22
-
-
0041965869
-
Text classification using string kernels
-
Lodhi H., Saunders C., Shawe-Taylor J., Cristianini N., and Watkins C. Text classification using string kernels. J Mach Learn Res 2 (2002) 419-444
-
(2002)
J Mach Learn Res
, vol.2
, pp. 419-444
-
-
Lodhi, H.1
Saunders, C.2
Shawe-Taylor, J.3
Cristianini, N.4
Watkins, C.5
-
23
-
-
84964499646
-
A hybrid approach to the profile creation and intrusion detection
-
IEEE Computer Society, Los Alamitos, CA, USA
-
Marin J., Ragsdale D., and Sirdu J. A hybrid approach to the profile creation and intrusion detection. Proceedings DARPA information survivability conference and exposition II (DISCEX'01), vol. 1 (2001), IEEE Computer Society, Los Alamitos, CA, USA 69-76
-
(2001)
Proceedings DARPA information survivability conference and exposition II (DISCEX'01), vol. 1
, pp. 69-76
-
-
Marin, J.1
Ragsdale, D.2
Sirdu, J.3
-
24
-
-
0003444646
-
-
MIT Press, Cambridge, MA
-
McClelland J.L., and Rumelhart D.E. Parallel distributed processing: explorations in the microstructure of cognition. vol. 2, psychological and biological models (1986), MIT Press, Cambridge, MA
-
(1986)
Parallel distributed processing: explorations in the microstructure of cognition. vol. 2, psychological and biological models
-
-
McClelland, J.L.1
Rumelhart, D.E.2
-
25
-
-
40749126943
-
-
New Technologies Inc. FileList Pro computer timeline software. .
-
New Technologies Inc. FileList Pro computer timeline software. .
-
-
-
-
26
-
-
84898944587
-
Intrusion detection with neural networks
-
Jordan M.I., Kearns M.J., and Solla S.A. (Eds), The MIT Press, Denver, CO
-
Ryan J., Lin M.J., and Miikkulainen R. Intrusion detection with neural networks. In: Jordan M.I., Kearns M.J., and Solla S.A. (Eds). Advances in Neural Information Processing Systems vol. 10 (1998), The MIT Press, Denver, CO 943-949
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
, pp. 943-949
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
27
-
-
27144475340
-
A comparative evaluation of two algorithms for windows registry anomaly detection
-
Stolfo S.J., Apap F., Eskin E., Heller K., Hershkop S., Honig A., et al. A comparative evaluation of two algorithms for windows registry anomaly detection. Journal of Computer Security 13 4 (2005) 659-693
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
, pp. 659-693
-
-
Stolfo, S.J.1
Apap, F.2
Eskin, E.3
Heller, K.4
Hershkop, S.5
Honig, A.6
-
28
-
-
40749162512
-
Legal methods of using computer forensics techniques for computer crime analysis and investigation
-
Thomas D.S., and Forcht K. Legal methods of using computer forensics techniques for computer crime analysis and investigation. Issues Inform Syst 5 2 (2004)
-
(2004)
Issues Inform Syst
, vol.5
, Issue.2
-
-
Thomas, D.S.1
Forcht, K.2
|