Author:
Kim Hyungseok,Kim Eunjin,Kang Seungmo,Kim Huy Kang
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference27 articles.
1. Casey, E. (2004). Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digital Investigation, 1(1), 28–43.
2. Meghanathan, N., Allam, S. R., & Moore, L. A. (2009). Tools and techniques for Network Forensics. International Journal of Network Security and its Applications, 1(1), 14–25.
3. Kim, H. S., & Kim, H. K. (2011). Network forensic evidence acquisition (NFEA) with packet marking. In 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW) (pp. 388–393).
4. MANDIANT Web Historian. http://www.mandiant.com/products/free_software/web_historian .
5. Greeks, M. Index.dat Analyzer. http://majorgeeks.com/Index.dat_Analyzer_d5259.html .
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN;Communications in Computer and Information Science;2022
2. Packet analysis for network forensics: A comprehensive survey;Forensic Science International: Digital Investigation;2020-03
3. Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime;Journal of King Saud University - Computer and Information Sciences;2019-12
4. Unmasking of source identity, a step beyond in cyber forensic;Proceedings of the 10th International Conference on Security of Information and Networks;2017-10-13