2016
DOI: 10.1109/jsyst.2015.2389518
|View full text |Cite
|
Sign up to set email alerts
|

Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Any detected unfair acting during the on-line exam should be regarded as circumstantial evidence and not as a proof from the judicial point of view [12,16]. Furthermore, a suspicion of cheating during on-line exams can lead to suspension of degree granting until the issue is resolved [15].…”
Section: Related Workmentioning
confidence: 99%
“…Any detected unfair acting during the on-line exam should be regarded as circumstantial evidence and not as a proof from the judicial point of view [12,16]. Furthermore, a suspicion of cheating during on-line exams can lead to suspension of degree granting until the issue is resolved [15].…”
Section: Related Workmentioning
confidence: 99%
“…There are many applications of IP geolocation, such as where the device locations may be needed retrospectively. These include address reputation [ 14 ], phishing mitigation [ 15 ], credit card fraud [ 16 ], and forensic investigation [ 17 ].…”
Section: Related Workmentioning
confidence: 99%
“…Based on their data, together with various predictive models, they are able to identify a specific web page and deduce its content even though the traffic is encrypted. A similar approach was also used by Koch and Rodosek for analysing SSH traffic. Another example of using traffic features is the work by Hellemons et al .…”
Section: Information Extraction From Encrypted Trafficmentioning
confidence: 99%
“…Koch and Rodosek proposed a system for detecting interactive attacks using SSH. Packet sizes, IP addresses and packet inter‐arrival times were used to create clusters of packets, which were likely to match an SSH command and its corresponding response.…”
Section: Feature‐based Traffic Classification Techniques For Encryptementioning
confidence: 99%