-
3
-
-
33947702316
-
Pervasive binding of labels to system processes
-
August Retrieved from
-
Florian Buchholz . Pervasive binding of labels to system processes. In Proceedings of the published Phd thesis, August 2005. Retrieved from https://users.cs.jmu.edu/buchhofp/publications/buchholz-thesis.pdf2.
-
(2005)
Proceedings of the Published Phd Thesis
-
-
Buchholz, F.1
-
4
-
-
10644285176
-
Providing process origin information to aid in computer forensic investigations
-
September
-
Florian Buchholz and Clay Shields. Providing process origin information to aid in computer forensic investigations. Journal of Computer Security, 12(5):753-776, September 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.5
, pp. 753-776
-
-
Buchholz, F.1
Shields, C.2
-
7
-
-
0036351977
-
A recursive session token protocol for use in computer forensicsand TCP traceback
-
June
-
B. Carrier and C. Shields. A recursive session token protocol for use in computer forensicsand TCP traceback. In Proceedings of the IEEE Infocomm 2002, June 2002.
-
(2002)
Proceedings of the IEEE Infocomm 2002
-
-
Carrier, B.1
Shields, C.2
-
9
-
-
7544240929
-
Defining event reconstruction of digital crime scenes
-
CERIAS TR 2004-37.13
-
Brian D. Carrier and Eugene H. Spafford. Defining event reconstruction of digital crime scenes. Journal of Forensic Sciences, 49(6), 11 2004. CERIAS TR 2004-37.13
-
(2004)
Journal of Forensic Sciences
, vol.49
, Issue.6
, pp. 11
-
-
Carrier, B.D.1
Spafford, E.H.2
-
14
-
-
0013393580
-
Location-based authentication: Grounding cyberspace for better security
-
ACM Press/Addison-Wesley Publishing Co.
-
Dorothy E. Denning and Peter F. Mac Doran. Location-based authentication: grounding cyberspace for better security. In Internet besieged: countering cyberspace scofflaws, pages 167-174. ACM Press/Addison-Wesley Publishing Co., 1998.
-
(1998)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 167-174
-
-
Denning, D.E.1
Mac Doran, P.F.2
-
15
-
-
84870852455
-
-
Encase forensic software, http://www.guidancesoftware.com.
-
-
-
-
18
-
-
84870770196
-
-
[ The forensic toolkit. http://www.accessdata.com/Product04-Overview.htm.
-
The Forensic Toolkit
-
-
-
20
-
-
84865629721
-
File timestamps in a cloud digital investigation
-
ISSN 1554-1010 Volume 6 March
-
Sean Thorpe, Indrajit Ray. File timestamps in a cloud digital investigation. Journal of Information Assurance and Security. ISSN 1554-1010 Volume 6 (March 2011) pp. 495-502
-
(2011)
Journal of Information Assurance and Security
, pp. 495-502
-
-
Thorpe, S.1
Ray, I.2
-
22
-
-
84971328814
-
A formal temporal log data model for the global synchronized virtual machine environment
-
Sean Thorpe, Indrajit Ray, Indrakshi Ray, Tyrone Grandison."A formal temporal log data model for the global synchronized virtual machine environment". International Journal of Information Assurance and Security (JIAS), Volume 6, No 2. 2011.
-
(2011)
International Journal of Information Assurance and Security (JIAS)
, vol.6
, Issue.2
-
-
Thorpe, S.1
Ray, I.2
Ray, I.3
Grandison, T.4
-
23
-
-
79951489100
-
Cloud computing:Forensic challenges for law enforcement
-
London, UK, Nov.
-
D.Riley, C.Wren, T.Berry."Cloud computing :Forensic challenges for law enforcement. Proceedings of the International Conference for Internet Technology and Secured Transactions, London, UK, Nov.2010
-
(2010)
Proceedings of the International Conference for Internet Technology and Secured Transactions
-
-
Riley, D.1
Wren, C.2
Berry, T.3
|