-
3
-
-
33846017674
-
Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations
-
21-23 June, United States Military Academy, West Point, NY
-
Endicott-Popovsky, B and Frincke, D., "Embedding forensic capabilities into networks: addressing inefficiencies in digital forensics investigations" in Proceedings from the Seventh IEEE Systems, Man and Cybernetics Information Assurance Workshop, 21-23 June 2006, United States Military Academy, West Point, NY, pp.133-139.
-
(2006)
Proceedings from the Seventh IEEE Systems, Man and Cybernetics Information Assurance Workshop
, pp. 133-139
-
-
Endicott-Popovsky, B.1
Frincke, D.2
-
5
-
-
33846002981
-
Coordinating with law enforcement on security issues
-
King County Bar Association, October 24, Seattle, WA
-
Orton, I. "Coordinating with law enforcement on security issues, " presented at Computer Security and Cybercrime II: Legal Risks and Responsibilities in a Dangerous World Workshop, King County Bar Association, October 24, 2002, Seattle, WA
-
(2002)
Presented at Computer Security and Cybercrime II: Legal Risks and Responsibilities in a Dangerous World Workshop
-
-
Orton, I.1
-
6
-
-
36248990670
-
Adding the Fourth 'R': A systems approach to solving the hacker's arms race
-
4 January 2006, Kauai, HI, Retrieved Feb. 17, 2007 from the World Wide Web
-
Endicott-Popovsky, B.E., Frincke, D. "Adding the Fourth 'R': A systems approach to solving the hacker's arms race. " Hawaii International Conference on System Sciences (HICSS) 39 Symposium: Skilled Human-intelligent Agent Performance: Measurement, Application and Symbiosis, 4 January 2006, Kauai, HI, Retrieved Feb. 17, 2007 from the World Wide Web: http://www.itl.nist.gov/iaui/vvrg/hicss39/4_r_s_rev_3_HICSS_ 2006.doc.
-
(2006)
Hawaii International Conference on System Sciences (HICSS) 39 Symposium: Skilled Human-intelligent Agent Performance: Measurement, Application and Symbiosis
-
-
Endicott-Popovsky, B.E.1
Frincke, D.2
-
7
-
-
84866660922
-
-
Carnegie-Mellon Software Engineering Institute CERT Coordination Center, Retrieved Feb. 17
-
Carnegie-Mellon Software Engineering Institute CERT Coordination Center. (2007). "CERT/CC Statistics 1988-2006. " Retrieved Feb. 17, 2007 from the World Wide Web: http://www.cert.org/stats/cert_stats.html.
-
(2007)
CERT/CC Statistics 1988-2006.
-
-
-
9
-
-
0003830237
-
-
New York: Doubleday-Currency
-
Senge, P., Roberts, C., Ross, R.B., Smith, B.J., & Kleiner, A. (1994). The Fifth Discipline Fieldbook: Strategies and Tools for Building a Learning Organization. New York: Doubleday-Currency.
-
(1994)
The Fifth Discipline Fieldbook: Strategies and Tools for Building a Learning Organization
-
-
Senge, P.1
Roberts, C.2
Ross, R.B.3
Smith, B.J.4
Kleiner, A.5
-
11
-
-
84866704628
-
-
presented at NWSec, February 15, 2007, Seattle, WA, Retrieved Feb. 17, from the World Wide Web
-
Kirk Bailey, "Trouble in cyberspace: Why this conference is important, " presented at NWSec, February 15, 2007, Seattle, WA, Retrieved Feb. 17, 2007, from the World Wide Web: http://students.washington.edu/greyhat/mainsec.html
-
(2007)
Trouble in cyberspace: Why this conference is important
-
-
Bailey, K.1
-
12
-
-
33748435812
-
-
CSI/FBI: CSI/FBI, Computer Security Institute
-
CSI/FBI: CSI/FBI. (2005). "Computer crime and security survey, " Computer Security Institute, San Francisco, CA.
-
(2005)
Computer crime and security survey
-
-
-
13
-
-
84866678113
-
King County Deputy Prosecutor
-
August 24, and September 29, 2006
-
Ivan Orton, King County Deputy Prosecutor. Personal interviews. August 24, 2006 and September 29, 2006.
-
(2006)
Personal interviews
-
-
Orton, I.1
-
14
-
-
36248976561
-
Concerns about intrusions into remotely accessible substation controllers and SCADA systems
-
th, 23-26 Oct. ober, Spokane, WA
-
th Annual Western Protective Relay Conference, 23-26 Oct. ober, 2000, Spokane, WA.
-
(2000)
Annual Western Protective Relay Conference
-
-
Oman, P.1
Schweitzer, E.2
Frincke, D.3
-
15
-
-
84866658241
-
Federal prosecutor (Retired)
-
Spring, Seattle University, Seattle, Washington
-
Schroeder, S., Federal prosecutor (Retired) (Spring, 2004). CSSE592 Computer forensics: Legal overview, Seattle University, Seattle, Washington.
-
(2004)
CSSE592 Computer forensics: Legal overview
-
-
Schroeder, S.1
-
16
-
-
84866704625
-
A post mortem
-
(2005). The New Zealand hacker case:, 8-10 September, The University of Oxford, Oxford, England. Retrieved Feb 17, 2007 from the World Wide Web
-
Endicott-Popovsky, B.E., Ryan, D., Frincke, D. (2005). The New Zealand hacker case: "A post mortem, " in Proceedings of the Safety and Security in a Networked World: Balancing Cyber-Rights & Responsibilities Conference at the Oxford Internet Institute, 8-10 September, 2005, The University of Oxford, Oxford, England. Retrieved Feb 17, 2007 from the World Wide Web: http://www.oii.ox.ac.uk/microsites/cybersafety/?view=papers
-
(2005)
Proceedings of the Safety and Security in a Networked World: Balancing Cyber-Rights & Responsibilities Conference at the Oxford Internet Institute
-
-
Endicott-Popovsky, B.E.1
Ryan, D.2
Frincke, D.3
-
17
-
-
33846022189
-
Hacker destroys 4500 web sites
-
November 19, 1998, Retrieved August 13, 2005 from the World Wide Web
-
Barton, C. "Hacker destroys 4500 web sites, " New Zealand Herald, November 19, 1998, Retrieved August 13, 2005 from the World Wide Web: http://www.landfield.com/isn/mailarchive/ 1998/Nov/0098.html
-
(1998)
New Zealand Herald
-
-
Barton, C.1
-
18
-
-
33846012384
-
-
New Zealand Herald, November 23, 1998, Retrieved August 13, from the World Wide Web
-
Wall, T. "Associates denounce website hacker, " New Zealand Herald, November 23, 1998, Retrieved August 13, 2005 from the World Wide Web: http://www.landfield.com/isn/mail-archive/1998/Nov/0098.html
-
(2005)
Associates denounce website hacker
-
-
Wall, T.1
-
20
-
-
85046982838
-
-
®, Retrieved August 02
-
®"Incident Note IN-98.04: Advanced scanning. " Retrieved August 02, 2005 from the World Wide Web: http://www.cert.org/incident_notes/IN-98.04.html
-
Incident Note IN-98.04: Advanced scanning.
-
-
-
21
-
-
84866658242
-
Honeynet Project
-
Retrieved August 04
-
Honeynet Project. (2000). "Know your enemy III: They gain root. " Retrieved August 04, 2005, from the World Wide Web: http://project.honeynet.org/papers/enemy3/index.html
-
(2000)
Know your enemy III: They gain root.
-
-
-
22
-
-
84866643341
-
Developing an effective incident cost analysis mechanism
-
June 12, 2002. Retrieved August 14, from the World Wide Web
-
Dittrich, D. "Developing an effective incident cost analysis mechanism, " Security Focus, June 12, 2002. Retrieved August 14, 2005 from the World Wide Web: http://online.securityfocus.com/infocus/1592
-
(2005)
Security Focus
-
-
Dittrich, D.1
-
23
-
-
84866678119
-
Real-world access control systematic failures: Reality or virtual reality
-
June '05, Ukraine
-
Attfield, P., "Real-world access control systematic failures: Reality or virtual reality, " in Journal Article Workshop, June '05, Ukraine.
-
(2005)
Journal Article Workshop
-
-
Attfield, P.1
-
24
-
-
33846015694
-
Seattle FBI briefing: Operation Flyhook
-
April 18, Seattle, WA
-
Schuler, M and P. Attfield. (April 18, 2002). "Seattle FBI briefing: Operation Flyhook, " Boeing Security Forum, Seattle, WA.
-
(2002)
Boeing Security Forum
-
-
Schuler, M.1
Attfield, P.2
-
25
-
-
84866671794
-
From Russia with Lopht
-
May 1, 2002. Retrieved August 7, from the World Wide Web
-
Koerner, B. "From Russia with Lopht. " Legal Affairs, May 1, 2002. Retrieved August 7, 2005 from the World Wide Web: http://www.newamerica.net/index.cfm?pg=article&DocID=792
-
(2005)
Legal Affairs
-
-
Koerner, B.1
-
26
-
-
84866643345
-
Court proceedings and public-record trial exhibits
-
United States. Department of Justice., WA, September
-
United States. Department of Justice. "Court proceedings and public-record trial exhibits, " United States v. Vasily Gorshkov. Seattle, WA, September 2001.
-
(2001)
United States v. Vasily Gorshkov. Seattle
-
-
-
27
-
-
84866671789
-
Press release: Russian hacker sentenced
-
United States. Department of Justice., NJ, July 25, 2003. Retrieved August 7, from the World Wide Web
-
United States. Department of Justice. "Press release: Russian hacker sentenced. " Newark, NJ, July 25, 2003. Retrieved August 7, 2005 from the World Wide Web: http://www.usdoj.gov/criminal/cybercrime/ivanovSent_NJ.htm
-
(2005)
Newark
-
-
-
28
-
-
84866658243
-
Redefining Computer Security to Include Forensics
-
Seattle, WA
-
Endicott-Popovsky, B.E., Frincke, D. Redefining Computer Security to Include Forensics, Poster session, 8th Annual Recent Advances in Intrusion Detection (RAID) Conference 7-9 September 2005, Seattle, WA.
-
(2005)
Poster session, 8th Annual Recent Advances in Intrusion Detection (RAID) Conference 7-9 September
-
-
Endicott-Popovsky, B.E.1
Frincke, D.2
-
30
-
-
33845978973
-
Policies to enhance computer and network forensics
-
(2001), June, United States Military Academy, West Point, NY
-
Yasinsac, A. and Manzano, Y. (2001) "Policies to enhance computer and network forensics. " Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. June 2001, United States Military Academy, West Point, NY.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Yasinsac, A.1
Manzano, Y.2
-
31
-
-
1942505732
-
Management strategies for implementing forensic security measures
-
[electronic version], June
-
Wolfe-Wilson, J. and Wolfe, H.B. (2003) "Management strategies for implementing forensic security measures "[electronic version]. Information Security Technical Report Volume 8, Issue 2, June 2003, pp.55-64.
-
(2003)
Information Security Technical Report
, vol.8
, Issue.2
, pp. 55-64
-
-
Wolfe-Wilson, J.1
Wolfe, H.B.2
-
32
-
-
3042642695
-
Getting physical with the digital investigation process
-
2 [Electronic version] Fall
-
Carrier, B. and Spafford, E. "Getting physical with the digital investigation process, " International Journal of Digital Evidence, vol. 2, 2 [Electronic version] Fall 2003.
-
(2003)
International Journal of Digital Evidence
, vol.2
-
-
Carrier, B.1
Spafford, E.2
-
36
-
-
48049123446
-
-
Unit Chief FBI CART (Retired), July 12, Syracuse, New York
-
Pollit, M. Unit Chief FBI CART (Retired), Personal interview, July 12, 2005, Syracuse, New York.
-
(2005)
Personal interview
-
-
Pollit, M.1
-
37
-
-
3042774608
-
Building theoretical underpinnings for digital forensics research
-
Issue 1
-
Mocas, S., (2004). "Building theoretical underpinnings for digital forensics research, " Compsec Online: Digital Investigations. Vol. 1, Issue 1.
-
(2004)
Compsec Online: Digital Investigations
, vol.1
-
-
Mocas, S.1
-
38
-
-
33845992755
-
The future of computer forensics: A needs survey
-
Purdue University, Layfayette, IN
-
Rogers, M. and K. Siegfried. (2003). "The future of computer forensics: A needs survey, " CERIAS Tech Report 2003-30, Purdue University, Layfayette, IN.
-
(2003)
CERIAS Tech Report 2003-30
-
-
Rogers, M.1
Siegfried, K.2
-
39
-
-
2442701031
-
A model for information assurance: An integrated approach
-
June, USMA, West Point
-
Maconachy, V., Schou, C., Ragsdale, D. and D. Welch,. A model for information assurance: an integrated approach,. in Proceedings of the 2nd Annual IEEE Information Assurance Workshop, June 2001, USMA, West Point.
-
(2001)
Proceedings of the 2nd Annual IEEE Information Assurance Workshop
-
-
McOnachy, V.1
Schou, C.2
Ragsdale, D.3
Welch, D.4
-
40
-
-
4644317619
-
Information systems security: A comprehensive model
-
th Annual Canadian Computer Security Conference, Ottawa, Ontario, May, 1992; reprinted in DataPro Reports on Information Security, Delran, NJ: McGraw-Hill
-
th Annual Canadian Computer Security Conference, Ottawa, Ontario, May, 1992; reprinted in DataPro Reports on Information Security, Delran, NJ: McGraw-Hill, 1992.
-
(1991)
th National Computer Security Conference
-
-
McCumber, J.1
-
41
-
-
0003449736
-
-
May, Software Engineering Institute
-
Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T.A. and. N.R. Mead. (May, 1999). "Survivable network systems: An emerging discipline. CMU/SEI 97-TR-013, " Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, PA.
-
(1999)
Survivable network systems: An emerging discipline. CMU/SEI 97-TR-013
-
-
Ellison, R.J.1
Fisher, D.A.2
Linger, R.C.3
Lipson, H.F.4
Longstaff, T.A.5
Mead, N.R.6
-
42
-
-
33845978641
-
Emerging problems on digital evidence
-
September, University of Idaho, Moscow, ID
-
Sommers, P. "Emerging problems on digital evidence. " Presented at the Computer Forensics Workshop, September, 2002, University of Idaho, Moscow, ID.
-
(2002)
Presented at the Computer Forensics Workshop
-
-
Sommers, P.1
-
43
-
-
85046981963
-
New directions in cyber law
-
June, Washington, D. C
-
th Colloquium. June 2003, Washington, D.C.
-
(2003)
th Colloquium
-
-
Ryan, D.1
-
45
-
-
48049116152
-
-
Chief Information Security Officer University of Washington, and Winn, J., Director of the Shidler Center for Law Commerce and Technology, University of Washington, Seattle, WA March 31
-
Bailey, K., Chief Information Security Officer University of Washington, and Winn, J., Director of the Shidler Center for Law Commerce and Technology, University of Washington, Personal interviews. Seattle, WA March 31, 2006.
-
(2006)
Personal interviews
-
-
Bailey, K.1
-
46
-
-
48049123446
-
-
Chief Technology Officer, Conjungi Corporation, Conjungi: Seattle, WA, Summer
-
Simon, M. Chief Technology Officer, Conjungi Corporation, Personal interviews. Conjungi: Seattle, WA, Summer, 2005.
-
(2005)
Personal interviews
-
-
Simon, M.1
-
48
-
-
84866658244
-
Harcourt Health Sciences
-
Retrieved from the World Wide Web July 31
-
W. B. Saunders Harcourt Health Sciences. "Definition: calibration, " Retrieved from the World Wide Web July 31, 2006. http://www.mercksource.com/pp/us/cns/cns_hl_dorlands.jspzQ zpgzEzzSzppdocszSzuszSzcommonzSzdorlandszSzdorlandzSz dmd_c_03zPzhtm
-
(2006)
Definition: Calibration
-
-
Saunders, W.B.1
|