Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Digital Forensics
biblio
Deploying Honeypots and Honeynets: Issue of Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
IP networks
security
pubcrawl170114
privacy
network security
network forensics
Monitoring
legal issues
legal framework
Law
Data collection
honeypots
honeypot
honeynets
honeynet
EU law
Digital Forensics
data retention
Data processing
data privacy
biblio
Entropy clustering approach for improving forecasting in DDoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:44pm
pattern clustering
forecasting theory
FPR
IDS
intrusion detection system
k-means clustering analysis
network analysis
network security
online anomaly detection
forecasting
Ports (Computers)
proactive forecast
project industrial partner
pubcrawl170109
Shannon entropy
Shannon-entropy concept
volume anomaly
alert management
feature extraction
false positive rate
entropy clustering approach
Entropy
distributed denial-of-service (DDoS) detection
distributed denial-of-service
Digital Forensics
digital forensic analysis
DDoS Attacks
cyber-range simulation dataset
computer network security
Computer crime
Clustering algorithms
clustering algorithm
Algorithm design and analysis
biblio
Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
digital forensic practitioner
Random access memory
pubcrawl170109
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT
biblio
Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
ExFAT
pubcrawl170109
process monitoring
media mirror
legal effect
lawsuit
Law
judicial identification
hash authentication
Forensics
File systems
file location algorithm
file locating
file character code algorithm
file character code
ExFAT file system
Algorithm design and analysis
evidence recovery
electronic data recovery forensics
electronic data
document fragment reassembly algorithm
document fragment
Distributed Bragg reflectors
digital signatures
digital multisignature
Digital Forensics
destroyed situation
data recovery
Data models
Cryptography
Computer crime
Classification algorithms
biblio
Forensic investigation framework for VoIP protocol
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
packet reordering
VoIP-SIP
VoIP-RTP
VoIP traffic
VoIP protocol
VoIP
Voice over Internet Protocol
Streaming media
SIP
signalling protocols
Servers
RTP
reconstruction algorithm
pubcrawl170109
Protocols
Ports (Computers)
communication facilities
next generation communication services-based IP
network pattern analysis
network forensic investigation framework
malicious users
malicious content
law enforcement system
Internet telephony
Forensics
forensic analysis
Electronic mail
Digital Forensics
cyber criminals
content level observation
Computer crime
biblio
Digital Forensic analysis for enhancing information security
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
Digital Forensics
pubcrawl170109
privacy
operating systems
information security enhancement
information security
image integrity
image acquisition
forensics science
forensic evidence
Analytical models
digital forensic analysis
digital forensic
digital crime scenario
data analysis
Cyberspace
Computers
antiforensic tool
antiforensic analysis
anti-digital forensic
biblio
Mitigating Circumstances in Cybercrime: A Position Paper
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
Media
warning messages
user cyber behaviour
software features
software engineering
Software
social responsibility
pubcrawl170109
psychology
mitigating circumstances
Mental disorders
circumstance mitigation
law aspect
irrational unconscious actions
interrelation analysis
Digital Forensics
Decision Making
cyberspace design
Cyberspace
Cybercrime
cyber psychology
Computer crime
biblio
A model for the design of next generation e-supply chain digital forensic readiness tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
Filtering
trading partners
supply chain management
Software
pubcrawl170109
Next generation networking
network forensics
Monitoring tools
Monitoring
internet
information and communications technology
ICT
Forensics domains
Business
eSC environment
electronic supply chain
electronic commerce
e-Supply Chains (eSCs)
e-supply chain
Digital Forensics
digital forensic readiness tools
Digital forensic readiness (DFR)
Digital forensic Investigation (DFI)
Digital forensic data analysis tools
Cybercrime
cyber-crime
biblio
Counterfeiting and Defending the Digital Forensic Process
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
anti-forensics
antiforensic techniques
Browsers
categorization
Computer crime
Computers
digital evidences
digital forensic process
Digital Forensics
forensic analysis
Forensics
initial phase
mitigation techniques
pubcrawl170109
Software
taxonomy
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »