Author:
Jankun-Kelly T. J.,Franck Josh,Wilson David,Carver Jeffery,Dampier David,Swan J. Edward
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge internet security. IEEE Computer 35(4), 5–7 (2002)
2. Noblett, M., Pollit, M., Presley, L.: Recovering and examining computer forensic evidence. Forensic Science Communications 2(4) (2000)
3. Wolfe, H.: Computer forensics. Computers and Security 22(1), 26–28 (2003)
4. Bequai, A.: Syndicated crime and international terrorism. Computers and Security 21(4), 333–337 (2002)
5. Kessler, G., Schirling, M.: Computer forensics: Cracking the books, cracking the case. Information Security, 68–81 (2002)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Visualizing BFT SMR Distributed Systems - Example of BFT-SMaRt;2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W);2018-06
2. Visualization evaluation for cyber security;Proceedings of the Eleventh Workshop on Visualization for Cyber Security;2014-11-10
3. Visual Analysis for Textual Relationships in Digital Forensic Evidence;Information Visualization;2011-04