NetADHICT: a tool for understanding network traffic
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Passive network forensics: behavioural classification of network hosts based on connection patterns
ACM SIGOPS Operating Systems Review
Quality assurance for evidence collection in network forensics
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Extracting attack sessions from real traffic with intrusion prevention systems
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Quality assurance evidence collection model for MSN forensics
Journal of Intelligent Manufacturing
Digital forensics research: The next 10 years
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Network forensic frameworks: Survey and research challenges
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Tool review: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
Analysis of individual traffic flows is essential to a complete understanding of network usage, but real-time monitoring requires significant resources and doesn't scale well. Network forensic analysis offers a more practical way to monitor and identify security vulnerabilities and configuration problems.