Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Internet Forensics
Visualizing Cyber Attacks using IP Matrix
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
IDS RainStorm: Visualizing IDS Alarms
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
Network Forensics on Mobile Ad-Hoc Networks
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III
Hi-index | 0.00 |
Various security weaknesses have been identified in mobile ad-hoc networks (MANET). The paper focuses on MANET forensics whereby a third party can prove there was attack by collecting and analyzing evidence about it. The paper describes such a MANET forensics analysis method using a Bloom filter.