Author:
Flaglien Anders,Franke Katrin,Arnes Andre
Publisher
Springer Berlin Heidelberg
Reference29 articles.
1. Y. Al-Hammadi and U. Aickelin, Detecting botnets through log correlation, Proceedings of the Workshop on Monitoring, Attack Detection and Mitigation, 2006.
2. A. Arnes, P. Haas, G. Vigna and R. Kemmerer, Using a virtual security testbed for digital forensic reconstruction, Computer Virology, vol. 2(4), pp. 275–289, 2007.
3. D. Ayers, A second generation computer forensic analysis system, Digital Investigation, vol. 6(S), pp. 34–42, 2009.
4. B. Carrier, The Sleuth Kit (www.sleuthkit.org).
5. A. Case, A. Cristina, L. Marziale, G. Richard and V. Roussev, FACE: Automated digital evidence discovery and correlation, Digital Investigation, vol. 5(S), pp. 65–75, 2008.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Associating Drives Based on Their Artifact and Metadata Distributions;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2018-12-30
2. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial;Advances in Information Security;2018
3. A Collaborative Approach to Botnet Protection;Lecture Notes in Computer Science;2012