-
1
-
-
49049120849
-
Improving the analysis of lawfully intercepted network packet data captured for forensic analysis
-
J. Broadway, B. Turnbull and J. Slay, Improving the analysis of lawfully intercepted network packet data captured for forensic analysis, Proceedings of the Third International Conference on Availability, Reliability and Security, pp. 1361-1368, 2008.
-
(2008)
Proceedings of the Third International Conference on Availability, Reliability and Security
, pp. 1361-1368
-
-
Broadway, J.1
Turnbull, B.2
Slay, J.3
-
4
-
-
51149091325
-
A theoretical framework for organizational network forensic readiness
-
B. Endicott-Popovsky, D. Frincke and C. Taylor, A theoretical framework for organizational network forensic readiness, Journal of Computers, vol. 2(3), pp. 1-11, 2007.
-
(2007)
Journal of Computers
, vol.2
, Issue.3
, pp. 1-11
-
-
Endicott-Popovsky, B.1
Frincke, D.2
Taylor, C.3
-
5
-
-
51149089618
-
Computer forensics laboratory and tools
-
G. Francia and K. Clinton, Computer forensics laboratory and tools, Journal of Computing Sciences in Colleges, vol. 20(6), pp. 143-150, 2005.
-
(2005)
Journal of Computing Sciences in Colleges
, vol.20
, Issue.6
, pp. 143-150
-
-
Francia, G.1
Clinton, K.2
-
8
-
-
78651111681
-
-
NIST Special Publication 800-48, Revision 1, National Institute of Standards and Technology, Gaithersburg, Maryland
-
K. Scarfone, D. Dicoi, M. Sexton and C. Tibbs, Guide to Securing Legacy IEEE 802.11 Wireless Networks, NIST Special Publication 800-48, Revision 1, National Institute of Standards and Technology, Gaithersburg, Maryland, 2008.
-
(2008)
Guide to Securing Legacy IEEE 802.11 Wireless Networks
-
-
Scarfone, K.1
Dicoi, D.2
Sexton, M.3
Tibbs, C.4
-
9
-
-
84864167883
-
Wireless forensics: Tapping the air - Part one
-
California
-
R. Siles, Wireless forensics: Tapping the air - Part one, Symantec Corporation, Mountain View, California (www.securityfocus.com /infocus/1884), 2007.
-
(2007)
Symantec Corporation, Mountain View
-
-
Siles, R.1
-
10
-
-
78651070862
-
Forensic readiness: Strategic thinking on incident response
-
presented at the
-
J. Tan, Forensic readiness: Strategic thinking on incident response, presented at the Second Annual CanSecWest Conference, 2001.
-
(2001)
Second Annual CanSecWest Conference
-
-
Tan, J.1
-
11
-
-
84864169188
-
Examining wireless access points and associated devices
-
C. Then, Examining wireless access points and associated devices, Forensic Focus (www.forensicfocus.com/downloads/examining-wire less-access-points.pdf), 2006.
-
(2006)
Forensic Focus
-
-
Then, C.1
-
15
-
-
45849143664
-
Wireless forensics: A new radio frequency based location system
-
E. Velasco, W. Chen, P. Ji and R. Hsieh, Wireless forensics: A new radio frequency based location system, Proceedings of the Pacific- Asia Workshop on Cybercrime and Computer Forensics, pp. 272- 277, 2008.
-
(2008)
Proceedings of the Pacific- Asia Workshop on Cybercrime and Computer Forensics
, pp. 272-277
-
-
Velasco, E.1
Chen, W.2
Ji, P.3
Hsieh, R.4
-
16
-
-
48349088710
-
The evidence collection of DoS attack in WLAN by usingWLAN forensic profiling system
-
D. Yim, J. Lim, S. Yun, S. Lim, O. Yi and J. Lim, The evidence collection of DoS attack in WLAN by usingWLAN forensic profiling system, Proceedings of the International Conference on Information Science and Security, pp. 197-204, 2008.
-
(2008)
Proceedings of the International Conference on Information Science and Security
, pp. 197-204
-
-
Yim, D.1
Lim, J.2
Yun, S.3
Lim, S.4
Yi, O.5
Lim, J.6
|