-
1
-
-
33745202013
-
Improving the computer forensic analysis process through visualization
-
February
-
Sheldon Teerlink and Robert F. Erbacher. Improving the computer forensic analysis process through visualization. Commun. ACM, 49:71-75, February 2006.
-
(2006)
Commun. ACM
, vol.49
, pp. 71-75
-
-
Teerlink, S.1
Erbacher, R.F.2
-
4
-
-
84864178755
-
-
April 2011. [Online; Status 04/15/ 2011]
-
Forensics Wiki. Visualization tools, April 2011. [Online; Status 04/15/2011] Available: http://www.forensicswiki.org/wiki/Tools:Visualization.
-
Visualization Tools
-
-
-
5
-
-
80455147656
-
-
April 2011. [Online; Status 04/15/2011]
-
Forensics Wiki. Timeline analysis bibliography, April 2011. [Online; Status 04/15/2011] Available: http://www.forensicswiki.org/wiki/Timeline- Analysis-Bibliography.
-
Timeline Analysis Bibliography
-
-
-
6
-
-
26944480219
-
Datenvisualisierung und data mining
-
Daniel A. Keim. Datenvisualisierung und Data Mining. atenbank- Spektrum, pages 30-39, 2002.
-
(2002)
Atenbank- Spektrum
, pp. 30-39
-
-
Keim, D.A.1
-
8
-
-
77951483494
-
Introduction to visualization for computer security
-
John R. Goodall, Gregory Conti, and Kwan-Liu Ma, editors. Springer Berlin Heidelberg. 10.1007/978-3-540-78243-8-1
-
J. R. Goodall. Introduction to visualization for computer security. In John R. Goodall, Gregory Conti, and Kwan-Liu Ma, editors, VizSEC 2007, Mathematics and Visualization, pages 1-17. Springer Berlin Heidelberg, 2008. 10.1007/978-3-540-78243-8-1.
-
VizSEC 2007, Mathematics and Visualization
, vol.2008
, pp. 1-17
-
-
Goodall, J.R.1
-
9
-
-
80455138187
-
A visual analytic framework for exploring relationships in textual contents of digital forensics evidence
-
D.; Stamps A.S.; Franck J.; Carver J.; Swan J.E.; Jankun-Kelly, T.J.; Wilson. A visual analytic framework for exploring relationships in textual contents of digital forensics evidence. Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on, pages 39-44, 2009.
-
(2009)
Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on
, pp. 39-44
-
-
Stamps, D.1
Franck, A.S.2
Carver, J.3
Swan, J.4
Jankun-Kelly, J.E.5
Wilson, T.J.6
-
12
-
-
80455147655
-
-
Encase April 2011. [Online; Status 04/15/ 2011]
-
GuidanceSoftware. Encase, April 2011. [Online; Status 04/15/2011] Available: http://www.guidancesoftware.com/.
-
-
-
-
13
-
-
84870770196
-
-
April 2011. [Online; Status 04/15/ 2011]
-
AccessData. Forensictoolkit, April 2011. [Online; Status 04/15/2011] Available: http://accessdata.com/products/forensic-investigation/ftk.
-
Forensictoolkit
-
-
-
14
-
-
80455138189
-
-
April 2011. [Online; Status 04/15/ 2011]
-
SleuthKit, April 2011. [Online; Status 04/15/2011] Available: http://www.sleuthkit.org/.
-
-
-
-
15
-
-
80455177368
-
-
April 2011. [Online; Status 04/15/ 2011]
-
TechPathways. Prodiscover dft, April 2011. [Online; Status 04/15/2011] Available: http://www.techpathways.com/ProDiscoverDFT.htm.
-
-
-
-
17
-
-
4043165234
-
A multi scale algorithm for drawing graphs nicely
-
3-21, October
-
Ronny Hadany and David Harel. A multi scale algorithm for drawing graphs nicely. Discrete Appl. Math., 113:3-21, October 2001.
-
(2001)
Discrete Appl. Math.
, vol.113
-
-
Hadany, R.1
Harel, D.2
-
18
-
-
0035197699
-
Animated exploration of dynamic graphs with radial layout
-
Washington, DC, USA. IEEE Computer Society
-
Ka-Ping Yee, Danyel Fisher, Rachna Dhamija, and Marti Hearst. Animated exploration of dynamic graphs with radial layout. In Proceedings of the IEEE Symposium on Information Visualization 2001 (INFOVIS'01), pages 43-, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
Proceedings of the IEEE Symposium on Information Visualization 2001 (INFOVIS'01)
, pp. 43
-
-
Yee, K.-P.1
Fisher, D.2
Dhamija, R.3
Hearst, M.4
-
20
-
-
33745460819
-
Visualizing network data for intrusion detection
-
Kulsoom Abdullah, Chris Lee, Gregory Conti, and John A. Copel. Visualizing network data for intrusion detection. In In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security. United States Military Academy, pages 2-3, 2005.
-
(2005)
Proceedings of the 2005 IEEE Workshop on Information Assurance and Security. United States Military Academy
, pp. 2-3
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copel, J.A.4
-
21
-
-
80455147651
-
-
April 2011. [Online; Status 04/23/ 2011]
-
tcpdump. April 2011. [Online; Status 04/23/2011] Available: http://www.tcpdump.org/
-
-
-
-
22
-
-
77954892938
-
Explorative visualization of log data to support forensic analysis and signature development
-
Sebastian Schmerl, Michael Vogel, Rene Rietz, and Hartmut Konig. Explorative visualization of log data to support forensic analysis and signature development. Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on, 0:109-118, 2010.
-
(2010)
Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
, pp. 109-118
-
-
Schmerl, S.1
Vogel, M.2
Rietz, R.3
Konig, H.4
|