共 50 条
- [11] Graphical analysis of captured network packets for detection of suspicious network nodes 2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
- [12] Attack Intention Analysis Model for Network Forensics SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411
- [13] An Empirical Study of Network Forensics Analysis Tools PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 366 - 370
- [14] Building evidence graphs for network forensics analysis 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 229 - 239
- [15] Understanding Network Forensics Analysis in an Operational Environment IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118
- [16] Network Security Approach for Digital Forensics Analysis ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
- [18] Packet analysis for network forensics: A comprehensive survey FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
- [19] Hypersparse Network Flow Analysis of Packets with GraphBLAS 2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
- [20] A Method for Classifying Packets into Network Flows Based on GHSOM MOBILE NETWORKS & APPLICATIONS, 2012, 17 (06): : 730 - 739