메뉴 건너뛰기




Volumn 4, Issue 3-4, 2007, Pages 146-157

A framework for post-event timeline reconstruction using neural networks

Author keywords

Computer forensics; Digital evidence; Digital forensic analysis; Digital investigation; Event reconstruction; Neural networks

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; DATA HANDLING; FILE ORGANIZATION; HARD DISK STORAGE;

EID: 40749151829     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2007.11.001     Document Type: Article
Times cited : (32)

References (28)
  • 1
    • 40749161685 scopus 로고    scopus 로고
    • Ahmad A, Ruighaver AB. FIRESTORM: exploring the need for a forensic tool for pattern correlation in Windows NT audit logs. Infowar034; 2002.
    • Ahmad A, Ruighaver AB. FIRESTORM: exploring the need for a forensic tool for pattern correlation in Windows NT audit logs. Infowar034; 2002.
  • 4
    • 33847193441 scopus 로고    scopus 로고
    • Buchholz F, Falk C. Design and implementation of Zeitline: a forensic timeline editor. In: Digital forensics research workshop; 2005.
    • Buchholz F, Falk C. Design and implementation of Zeitline: a forensic timeline editor. In: Digital forensics research workshop; 2005.
  • 5
    • 40749087413 scopus 로고    scopus 로고
    • Carrier BD. Open source digital forensics tools: the legal argument. .
    • Carrier BD. Open source digital forensics tools: the legal argument. .
  • 6
    • 33646847862 scopus 로고    scopus 로고
    • Data mining or knowledge discovery in databases: an overview
    • Auerbach Publications, New York
    • Carbone P.L. Data mining or knowledge discovery in databases: an overview. Data management handbook (1997), Auerbach Publications, New York
    • (1997) Data management handbook
    • Carbone, P.L.1
  • 7
    • 3042768157 scopus 로고    scopus 로고
    • Defining digital forensic examination and analysis tools using abstraction layers
    • Carrier B. Defining digital forensic examination and analysis tools using abstraction layers. Int J Digit Evid 1 4 (2003)
    • (2003) Int J Digit Evid , vol.1 , Issue.4
    • Carrier, B.1
  • 8
    • 40749088661 scopus 로고    scopus 로고
    • Cohen W. Fast effective rule induction. In: 12th International conference on machine learning (ICML 95); 1995. p. 115-23.
    • Cohen W. Fast effective rule induction. In: 12th International conference on machine learning (ICML 95); 1995. p. 115-23.
  • 9
    • 84867720924 scopus 로고    scopus 로고
    • Carrier BD, Spafford EH. Automated digital evidence target definition using outlier analysis and existing evidence. In: Digital forensic research workshop (DFRWS), New Orleans, LA; 2005.
    • Carrier BD, Spafford EH. Automated digital evidence target definition using outlier analysis and existing evidence. In: Digital forensic research workshop (DFRWS), New Orleans, LA; 2005.
  • 10
    • 3042727240 scopus 로고    scopus 로고
    • Error, uncertainty and loss in digital evidence
    • Casey E. Error, uncertainty and loss in digital evidence. Int J Dig Evid 1 2 (2002)
    • (2002) Int J Dig Evid , vol.1 , Issue.2
    • Casey, E.1
  • 11
    • 7544240929 scopus 로고    scopus 로고
    • Defining event reconstruction of digital crime scenes
    • Carrier B.D., and Spafford E.H. Defining event reconstruction of digital crime scenes. J Forensic Sci 49 6 (2004) 1291-1298
    • (2004) J Forensic Sci , vol.49 , Issue.6 , pp. 1291-1298
    • Carrier, B.D.1    Spafford, E.H.2
  • 12
    • 40749122741 scopus 로고    scopus 로고
    • Chan PK, Mahoney MV, Arshad MH. A machine learning approach to anomaly detection. Florida Institute of Technology, Melbourne, FL 32901, USA. Technical report CS-2003-06; 2003.
    • Chan PK, Mahoney MV, Arshad MH. A machine learning approach to anomaly detection. Florida Institute of Technology, Melbourne, FL 32901, USA. Technical report CS-2003-06; 2003.
  • 13
    • 40749139628 scopus 로고    scopus 로고
    • DeVel O. File classification using sub-sequence kernels. In: Digital forensic research workshop (DFRWS'03); 2003.
    • DeVel O. File classification using sub-sequence kernels. In: Digital forensic research workshop (DFRWS'03); 2003.
  • 15
    • 26444565569 scopus 로고
    • Finding structure in time
    • Elman J.L. Finding structure in time. Cognit Sci 14 (1990) 179-211
    • (1990) Cognit Sci , vol.14 , pp. 179-211
    • Elman, J.L.1
  • 16
    • 40749155173 scopus 로고    scopus 로고
    • Goel A, Feng WC, Maier D, Walpole J. Forensix: a robust, high-performance reconstruction system. In: 25th IEEE International Conference on Distributed computing systems workshops; 2005;6(10):155-62.
    • Goel A, Feng WC, Maier D, Walpole J. Forensix: a robust, high-performance reconstruction system. In: 25th IEEE International Conference on Distributed computing systems workshops; 2005;6(10):155-62.
  • 17
    • 0027668428 scopus 로고
    • Statistical foundations of audit trail analysis for the detection of computer misuse
    • Helman P., and Liepins E.G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans Software Eng 19 (1993) 886-901
    • (1993) IEEE Trans Software Eng , vol.19 , pp. 886-901
    • Helman, P.1    Liepins, E.G.2
  • 20
    • 33745981119 scopus 로고    scopus 로고
    • An empirical study of event reconstruction systems
    • Jeyaraman S., and Atallah M.J. An empirical study of event reconstruction systems. Dig Invest 3 (2006) 108-115
    • (2006) Dig Invest , vol.3 , pp. 108-115
    • Jeyaraman, S.1    Atallah, M.J.2
  • 21
    • 40749117819 scopus 로고    scopus 로고
    • King ST, Chen PM. Backtracking intrusions. In: Proceedings of the 2003 symposium on operating systems (SOSP); October 2003.
    • King ST, Chen PM. Backtracking intrusions. In: Proceedings of the 2003 symposium on operating systems (SOSP); October 2003.
  • 25
    • 40749126943 scopus 로고    scopus 로고
    • New Technologies Inc. FileList Pro computer timeline software. .
    • New Technologies Inc. FileList Pro computer timeline software. .
  • 26
    • 84898944587 scopus 로고    scopus 로고
    • Intrusion detection with neural networks
    • Jordan M.I., Kearns M.J., and Solla S.A. (Eds), The MIT Press, Denver, CO
    • Ryan J., Lin M.J., and Miikkulainen R. Intrusion detection with neural networks. In: Jordan M.I., Kearns M.J., and Solla S.A. (Eds). Advances in Neural Information Processing Systems vol. 10 (1998), The MIT Press, Denver, CO 943-949
    • (1998) Advances in Neural Information Processing Systems , vol.10 , pp. 943-949
    • Ryan, J.1    Lin, M.J.2    Miikkulainen, R.3
  • 28
    • 40749162512 scopus 로고    scopus 로고
    • Legal methods of using computer forensics techniques for computer crime analysis and investigation
    • Thomas D.S., and Forcht K. Legal methods of using computer forensics techniques for computer crime analysis and investigation. Issues Inform Syst 5 2 (2004)
    • (2004) Issues Inform Syst , vol.5 , Issue.2
    • Thomas, D.S.1    Forcht, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.