International ICST Conference on Digital Forensics & Cyber Crime最新文献

筛选
英文 中文
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment 分布式取证计算云数据库环境中日志同步事件的形式化参数化
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_13
Sean S. E. Thorpe, I. Ray, I. Ray, Tyrone Grandison, A. Barbir, R. France
{"title":"Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment","authors":"Sean S. E. Thorpe, I. Ray, I. Ray, Tyrone Grandison, A. Barbir, R. France","doi":"10.1007/978-3-642-35515-8_13","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_13","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Rescuing Digital Data from Submerged HDD 从水下硬盘抢救数字数据
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_19
T. Yasuhira, Kazuhiro Nishimura, Tomofumi Koida
{"title":"Rescuing Digital Data from Submerged HDD","authors":"T. Yasuhira, Kazuhiro Nishimura, Tomofumi Koida","doi":"10.1007/978-3-642-35515-8_19","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_19","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132985449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tracking User Activity on Personal Computers 跟踪用户在个人电脑上的活动
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_16
Anthony Keane, S. O’Shaughnessy
{"title":"Tracking User Activity on Personal Computers","authors":"Anthony Keane, S. O’Shaughnessy","doi":"10.1007/978-3-642-35515-8_16","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_16","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128811692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating the Forensic Image Generator Generator 评估法医图像生成器生成器
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_20
Christian Moch, F. Freiling
{"title":"Evaluating the Forensic Image Generator Generator","authors":"Christian Moch, F. Freiling","doi":"10.1007/978-3-642-35515-8_20","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_20","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121786270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
All Bot Net: A Need for Smartphone P2P Awareness 所有僵尸网络:需要智能手机的P2P意识
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_4
K. Cole, R. L. Silva, Richard P. Mislan
{"title":"All Bot Net: A Need for Smartphone P2P Awareness","authors":"K. Cole, R. L. Silva, Richard P. Mislan","doi":"10.1007/978-3-642-35515-8_4","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116516170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Methodology for Malware Intrusion Attack Path Reconstruction 一种新的恶意软件入侵攻击路径重构方法
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_11
Ahmed F. Shosha, Joshua James, P. Gladyshev
{"title":"A Novel Methodology for Malware Intrusion Attack Path Reconstruction","authors":"Ahmed F. Shosha, Joshua James, P. Gladyshev","doi":"10.1007/978-3-642-35515-8_11","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_11","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Issues About Context-Triggered Piecewise Hashing 关于上下文触发分段哈希的性能问题
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_12
Frank Breitinger, Harald Baier
{"title":"Performance Issues About Context-Triggered Piecewise Hashing","authors":"Frank Breitinger, Harald Baier","doi":"10.1007/978-3-642-35515-8_12","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Windows Phone 7 from a Digital Forensics' Perspective 从数字取证的角度分析Windows Phone 7
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_6
Thomas Schaefer, Hans Höfken, Marko Schuba
{"title":"Windows Phone 7 from a Digital Forensics' Perspective","authors":"Thomas Schaefer, Hans Höfken, Marko Schuba","doi":"10.1007/978-3-642-35515-8_6","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_6","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123284634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers 互联网儿童色情,美国量刑指南,以及互联网服务提供商的角色
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_2
Kathryn C. Seigfried-Spellar, G. Bertoline, M. Rogers
{"title":"Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers","authors":"Kathryn C. Seigfried-Spellar, G. Bertoline, M. Rogers","doi":"10.1007/978-3-642-35515-8_2","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_2","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Finding Forensic Information on Creating a Folder in $LogFile of NTFS 查找在NTFS的$LogFile中创建文件夹的取证信息
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2011-10-26 DOI: 10.1007/978-3-642-35515-8_18
Gyusang Cho, M. Rogers
{"title":"Finding Forensic Information on Creating a Folder in $LogFile of NTFS","authors":"Gyusang Cho, M. Rogers","doi":"10.1007/978-3-642-35515-8_18","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_18","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信