Subject
Law,Medical Laboratory Technology,Computer Science Applications
Reference22 articles.
1. A technique for counting NATed hosts;Bellovin,2002
2. The session token protocol for forensics and traceback;Carrier;ACM Trans Inf Syst Secur,2004
3. Network traffic as a source of evidence: tool strengths, weaknesses, and future needs;Casey;Digit Invest,2004
4. Pyflag – an advanced network forensic framework;Cohen,2008
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献