메뉴 건너뛰기




Volumn , Issue , 2005, Pages 154-163

Forensic analysis of file system intrusions using improved backtracking

Author keywords

Backtracking; Data flow analysis; Dynamic slicing; File system; Intrusion detection

Indexed keywords

DATA FLOW ANALYSIS; DATA TRANSFER; DIGITAL STORAGE; FILE ORGANIZATION; FLOW GRAPHS;

EID: 84869597650     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (38)

References (33)
  • 12
    • 85077731848 scopus 로고    scopus 로고
    • Unix security: Security in programming
    • M. Bishop. Unix security: Security in programming. SANS'96, 1996.
    • (1996) SANS'96
    • Bishop, M.1
  • 13
    • 84978401615 scopus 로고    scopus 로고
    • Revirt: Enabling intrusion analysis through virtual-machine logging and replay
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev., 36(SI):211-224, 2002.
    • (2002) SIGOPS Oper. Syst. Rev. , vol.36 , pp. 211-224
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.A.4    Chen, P.M.5
  • 28
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • F. Tip. A survey of program slicing techniques. Journal of programming languages, 3:121-189, 1995.
    • (1995) Journal of Programming Languages , vol.3 , pp. 121-189
    • Tip, F.1
  • 29
    • 0020157396 scopus 로고
    • Programmers use slices when debugging
    • M. Weiser. Programmers use slices when debugging. Communications, ACM, 25(7):446-452, 1982.
    • (1982) Communications , vol.25 , Issue.7 , pp. 446-452
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.