2014 World Congress on Computer Applications and Information Systems (WCCAIS) 2014
DOI: 10.1109/wccais.2014.6916615
|View full text |Cite
|
Sign up to set email alerts
|

An evidential network forensics analysis model with adversarial capability and layering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…(Sikos, 2020) This paper is a comprehensive survey of the utilization of packet analysis, including deep packet inspection, in network forensics, and provides a review of AIpowered packet analysis methods with advanced network classification and pattern identification capabilities. (Amran & Saad, 2014) This paper proposes a model for network forensics analysis that captures appropriately defined adversarial capability and structured by a layered approach to investigation. (Qureshi et al, 2021) This paper provides a comprehensive analysis of the concept of network forensic investigation and describing the methodologies and tools employed in network forensic investigations by emphasizing on the study and analysis of the OSCAR methodology.…”
Section: Related Literaturementioning
confidence: 99%
“…(Sikos, 2020) This paper is a comprehensive survey of the utilization of packet analysis, including deep packet inspection, in network forensics, and provides a review of AIpowered packet analysis methods with advanced network classification and pattern identification capabilities. (Amran & Saad, 2014) This paper proposes a model for network forensics analysis that captures appropriately defined adversarial capability and structured by a layered approach to investigation. (Qureshi et al, 2021) This paper provides a comprehensive analysis of the concept of network forensic investigation and describing the methodologies and tools employed in network forensic investigations by emphasizing on the study and analysis of the OSCAR methodology.…”
Section: Related Literaturementioning
confidence: 99%