2010
DOI: 10.1007/978-3-642-15766-0_18
|View full text |Cite
|
Sign up to set email alerts
|

Network Forensic Analysis by Correlation of Attacks with Network Attributes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Further, maintaining network logs is not trivial, and analysis often requires the inspection of large files . To expedite the attribution mechanism, forensics can also be integrated with visualization tools .…”
Section: Survey Of Attribution Techniquesmentioning
confidence: 99%
“…Further, maintaining network logs is not trivial, and analysis often requires the inspection of large files . To expedite the attribution mechanism, forensics can also be integrated with visualization tools .…”
Section: Survey Of Attribution Techniquesmentioning
confidence: 99%
“…Analysis of large data streams is essential in many domains, including natural language processing [2], load balancing [3], and forensic analysis [4]. Typically, the data volume renders exact analysis algorithms too expensive.…”
Section: Introductionmentioning
confidence: 99%