Author:
Khan Muhammad Naeem Ahmed
Publisher
Springer Science and Business Media LLC
Subject
General Physics and Astronomy
Reference47 articles.
1. Kent K, Souppaya M (2006) Guide to computer security log management. NIST Special Publication 800–92
2. Verizon (2012) 2012 data breach investigations report. Technical report prepared by V. B. R. Team
3. McDougal M (2006) Live forensics on a windows system: using windows forensic toolchest (WFT).
http://www.foolmoon.net/security/
4. Greenemeier L (2011) Seeking address: why cyber attacks are so difficult to trace back to hackers. Scientific American.
https://www.scientificamerican.com/article/tracking-cyber-hackers/
5. Adelstein F (2006) Live forensics: diagnosing your system without killing it first. Commun ACM 49(2):63–66
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献