Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

network forensic analysis

biblio

Visible to the public Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs

Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
  • pubcrawl
  • Metrics
  • multistep attacks
  • network forensic analysis
  • network privileges
  • network size
  • network targets
  • network theory (graphs)
  • network topologies
  • information retrieval
  • resilience
  • Resiliency
  • security
  • standard logical attack graphs
  • standards
  • summarised information retrieval
  • tools
  • core attack graph
  • attack graphs
  • attack paths
  • bad guys tracking
  • compact representation
  • complex networks
  • Complexity theory
  • composability
  • Computer crime
  • Algorithm design and analysis
  • core graphs
  • Digital Forensics
  • forensic evaluation threshold
  • forensic investigators
  • forensic methodology
  • Forensics
  • graph theory
biblio

Visible to the public Data Generation and Analysis for Digital Forensic Application Using Data Mining

Submitted by BrandonB on Wed, 05/06/2015 - 10:38am
  • firewall logs
  • Web browser
  • transactional data
  • storage management
  • security
  • remote system forensic
  • packet captures
  • network traffic
  • network traces
  • network forensic analysis
  • network attack detection
  • memory forensic analysis
  • Log Data collection
  • intrusion detection system
  • FTK 4.0
  • firewalls
  • clustering
  • Digital Forensics
  • Digital forensic tool
  • digital forensic application
  • Databases
  • Data visualization
  • data storage
  • Data mining
  • data generation
  • Data collection
  • data analysis
  • cyber system
  • cyber crime huge log data
  • Computers
  • Computer crime

Terms of Use  |  ©2023. CPS-VO