Academic literature on the topic 'Network forensic framework analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network forensic framework analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network forensic framework analysis"
Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.
Full textHaggerty, John, Alexander J. Karran, David J. Lamb, and Mark Taylor. "A Framework for the Forensic Investigation of Unstructured Email Relationship Data." International Journal of Digital Crime and Forensics 3, no. 3 (July 2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.
Full textN, Karthikeyan, and Godwin Ponsam J. "Differentiation of Natural and Maliciously Induced Packet Loss in Wireless Network Using Forensic Analysis." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 354. http://dx.doi.org/10.14419/ijet.v7i4.6.28440.
Full textDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Full textChethana H. T. and Trisiladevi C. Nagavi. "A New Framework for Matching Forensic Composite Sketches With Digital Images." International Journal of Digital Crime and Forensics 13, no. 5 (September 2021): 1–19. http://dx.doi.org/10.4018/ijdcf.20210901.oa1.
Full textBijalwan, Anchit, Vijender Kumar Solanki, and Emmanuel Shubhakar Pilli. "BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES." Network Protocols and Algorithms 10, no. 2 (June 28, 2018): 28. http://dx.doi.org/10.5296/npa.v10i2.13144.
Full textKhan, Muhammad Naeem Ahmed. "Multi-agent Based Forensic Analysis Framework for Infrastructures Involving Storage Networks." Proceedings of the National Academy of Sciences, India Section A: Physical Sciences 89, no. 2 (March 14, 2018): 291–309. http://dx.doi.org/10.1007/s40010-017-0473-3.
Full textAnton Yudhana, Abdul Fadlil, and Muhammad Rizki Setyawan. "Analysis of Skype Digital Evidence Recovery based on Android Smartphones Using the NIST Framework." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 4 (August 17, 2020): 682–90. http://dx.doi.org/10.29207/resti.v4i4.2093.
Full textTurner, Adam B., Stephen McCombie, and Allon J. Uhlmann. "Discerning payment patterns in Bitcoin from ransomware attacks." Journal of Money Laundering Control 23, no. 3 (July 5, 2020): 545–89. http://dx.doi.org/10.1108/jmlc-02-2020-0012.
Full textReid, Shannon E. "Friendship Group Composition and Juvenile Institutional Misconduct." International Journal of Offender Therapy and Comparative Criminology 61, no. 2 (July 28, 2016): 191–209. http://dx.doi.org/10.1177/0306624x15589737.
Full textDissertations / Theses on the topic "Network forensic framework analysis"
Fairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.
Full textPluskal, Jan. "Framework for Captured Network Communication Processing." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-413326.
Full textSenthivel, Saranyan. "Automatic Forensic Analysis of PCCC Network Traffic Log." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2394.
Full textvan, den Berg Jelle, and Filip Lagerholm. "Forensic Analysis of the Nintendo Switch." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42451.
Full textRajasekaran, Sathya Dev Squicciarini Anna C. Metzner John J. "Social network risk analysis and privacy framework." [University Park, Pa.] : Pennsylvania State University, 2009. http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-4812/index.html.
Full textSaltaformaggio, Brendan D. "Forensic Carving of Wireless Network Information from the Android Linux Kernel." ScholarWorks@UNO, 2012. http://scholarworks.uno.edu/honors_theses/20.
Full textAkkaya, Deniz, and Fabien Thalgott. "Honeypots in network security." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Full textDay by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.
Moe, Lwin P. "Cyber security risk analysis framework : network traffic anomaly detection." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118536.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 84-86).
Cybersecurity is a growing research area with direct commercial impact to organizations and companies in every industry. With all other technological advancements in the Internet of Things (IoT), mobile devices, cloud computing, 5G network, and artificial intelligence, the need for cybersecurity is more critical than ever before. These technologies drive the need for tighter cybersecurity implementations, while at the same time act as enablers to provide more advanced security solutions. This paper will discuss a framework that can predict cybersecurity risk by identifying normal network behavior and detect network traffic anomalies. Our research focuses on the analysis of the historical network traffic data to identify network usage trends and security vulnerabilities. Specifically, this thesis will focus on multiple components of the data analytics platform. It explores the big data platform architecture, and data ingestion, analysis, and engineering processes. The experiments were conducted utilizing various time series algorithms (Seasonal ETS, Seasonal ARIMA, TBATS, Double-Seasonal Holt-Winters, and Ensemble methods) and Long Short-Term Memory Recurrent Neural Network algorithm. Upon creating the baselines and forecasting network traffic trends, the anomaly detection algorithm was implemented using specific thresholds to detect network traffic trends that show significant variation from the baseline. Lastly, the network traffic data was analyzed and forecasted in various dimensions: total volume, source vs. destination volume, protocol, port, machine, geography, and network structure and pattern. The experiments were conducted with multiple approaches to get more insights into the network patterns and traffic trends to detect anomalies.
by Lwin P. Moe.
S.M. in Engineering and Management
Mallek, Sabrine. "Social Network Analysis : Link prediction under the Belief Function Framework." Thesis, Artois, 2018. http://www.theses.fr/2018ARTO0204/document.
Full textSocial networks are large structures that depict social linkage between millions of actors. Social network analysis came out as a tool to study and monitor the patterning of such structures. One of the most important challenges in social network analysis is the link prediction problem. Link prediction investigates the potential existence of new associations among unlinked social entities. Most link prediction approaches focus on a single source of information, i.e. network topology (e.g. node neighborhood) assuming social data to be fully trustworthy. Yet, such data are usually noisy, missing and prone to observation errors causing distortions and likely inaccurate results. Thus, this thesis proposes to handle the link prediction problem under uncertainty. First, two new graph-based models for uniplex and multiplex social networks are introduced to address uncertainty in social data. The handled uncertainty appears at the links level and is represented and managed through the belief function theory framework. Next, we present eight link prediction methods using belief functions based on different sources of information in uniplex and multiplex social networks. Our proposals build upon the available information in data about the social network. We combine structural information to social circles information and node attributes along with supervised learning to predict new links. Tests are performed to validate the feasibility and the interest of our link prediction approaches compared to the ones from literature. Obtained results on social data from real-world demonstrate that our proposals are relevant and valid in the link prediction context
Padbidri, Jagan Mohan. "A network-cell based framework for multiscale analysis of granular materials." Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Dissertations/Spring2010/j_padbidri_041510.pdf.
Full textBooks on the topic "Network forensic framework analysis"
Lingeman, Jesse M. Network Inference in Molecular Biology: A Hands-on Framework. New York, NY: Springer New York, 2012.
Find full textGyamfi-Aidoo, Jacob. Africa Environment Information Network: Framework for capacity building in integrated environmental assessments and reporting in Africa. Nairobi, Kenya: United Nations Environment Programme, 2003.
Find full textBartone, Paul T. Organizational analysis of the TIDES project and the STAR-TIDES network using the 7-S framework. Washington, DC: Center for Technology & National Security Policy, National Defense University, 2013.
Find full textCouncil of Europe. Committee of Ministers. The use of analysis of deoxyribonucleic acid (DNA) within the framework of the criminal justice system: Recommendation No. R (92) 1 [of the Committee of Ministers] on 10 February 1992 and explanatory memorandum. Strasbourg: Council of Europe Press, 1993.
Find full textMinisters, Council of Europe Committee of. The use of analysis of deoxyribonucleic acid (DNA) within the framework of the criminal justice system: Recommendation no. R (92) 1 adopted by the Committee of Ministers of the Council of Europe on 10 February 1992 and explanatory memorandum. Strasbourg: Council of Europe, 1993.
Find full textScharnberg, Max. Textual analysis: a Scientific Apporach for Assessing Cases of Sexual Abuse.: Vol. 1: The Theoretical Framework, the Psychology of Lying, and Cases of Older Children.vol. 2: Cases of Younger Children, Including a Cases of Alleged Necrophilia, and the Shortcomings of Judicial Logic. Uppsala, Sweden: Uppsala universitet, Uppsala, Sweden, 1996.
Find full textDergunova, Viktoriya, and Anastasiya Prokopova. Analysis of legal regulation and judicial practice of resolving disputes between parents about children. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1218051.
Full textBindemann, Markus, ed. Forensic Face Matching. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198837749.001.0001.
Full textCunningham, Daniel, Sean Everton, and Philip Murphy. Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Rowman & Littlefield Publishers, Incorporated, 2016.
Find full textUnderstanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Rowman & Littlefield Publishers, Incorporated, 2016.
Find full textBook chapters on the topic "Network forensic framework analysis"
Bhondele, Ankita, Shatrunjay Rawat, and Shesha Shila Bharadwaj Renukuntla. "Network Management Framework for Network Forensic Analysis." In Advances in Intelligent Systems and Computing, 397–404. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13731-5_43.
Full textPilli, Emmanuel S., Ramesh C. Joshi, and Rajdeep Niyogi. "A Framework for Network Forensic Analysis." In Information and Communication Technologies, 142–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15766-0_21.
Full textNimirthi, Pradeepthi, P. Venkata Krishna, Mohammad S. Obaidat, and V. Saritha. "A Framework for Sentiment Analysis Based Recommender System for Agriculture Using Deep Learning Approach." In Social Network Forensics, Cyber Security, and Machine Learning, 59–66. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1456-8_5.
Full textJoshi, R. C., and Emmanuel S. Pilli. "Network Forensic Analysis." In Computer Communications and Networks, 107–29. London: Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7299-4_6.
Full textMorrissey, Sean. "Network Analysis." In iOS Forensic Analysis for iPhone, iPad, and iPod touch, 323–42. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3343-5_10.
Full textAshraf, Jamshaid, and Omar Khadeer Hussain. "Ontology Usage Network Analysis Framework." In Web Technologies and Applications, 19–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37401-2_5.
Full textWarren, Christopher, Eman El-Sheikh, and Nhien-An Le-Khac. "Privacy Preserving Internet Browsers: Forensic Analysis of Browzar." In Computer and Network Security Essentials, 369–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_21.
Full textHampton, Nikolai, and Zubair A. Baig. "Timestamp Analysis for Quality Validation of Network Forensic Data." In Network and System Security, 235–48. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_16.
Full textKaur, Prabhjot, Anchit Bijalwan, R. C. Joshi, and Amit Awasthi. "Network Forensic Process Model and Framework: An Alternative Scenario." In Advances in Intelligent Systems and Computing, 493–502. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-5903-2_50.
Full textKaushik, Atul Kant, Emmanuel S. Pilli, and R. C. Joshi. "Network Forensic Analysis by Correlation of Attacks with Network Attributes." In Information and Communication Technologies, 124–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15766-0_18.
Full textConference papers on the topic "Network forensic framework analysis"
Benchikha, Nadia, Mohamed Krim, Khaled Zeraoulia, and Chafika Benzaid. "IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework." In 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, 2016. http://dx.doi.org/10.1109/ccc.2016.23.
Full textSingh, Kumar Shanu, Annie Irfan, and Neelam Dayal. "Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036214.
Full textSivaprasad, Abirami. "Secured Proactive Network Forensic Framework." In 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC). IEEE, 2017. http://dx.doi.org/10.1109/ctceec.2017.8455003.
Full textKang, Seung-hoon, and Juho Kim. "Network Forensic Analysis Using Visualization Effect." In 2008 International Conference on Convergence and Hybrid Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/ichit.2008.165.
Full textAhmad, Samsiah, Nor Liza Saad, Zalikha Zulkifli, and Siti Hajar Nasaruddin. "Proposed network forensic framework for analyzing IaaS cloud computing environment." In 2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC). IEEE, 2015. http://dx.doi.org/10.1109/ismsc.2015.7594043.
Full textHuang, Shin-Ying, and Yennun Huang. "Network Forensic Analysis Using Growing Hierarchical SOM." In 2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW). IEEE, 2013. http://dx.doi.org/10.1109/icdmw.2013.66.
Full textChang, Cheng-Yue, and Jing-Sha He. "Network Forensic Analysis via Vulnerability Evidence Reasoning." In 2016 International Conference on Computer Engineering and Information Systems. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/ceis-16.2016.48.
Full textPanta, Franck Jeveme, André Péninou, and Florence Sèdes. "Negative filtering of CCTV Content - forensic video analysis framework." In ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3407069.
Full textGhabban, Fahad M., Ibrahim M. Alfadli, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm, and Mahmoud Ahmad Al-Khasawneh. "Comparative Analysis of Network Forensic Tools and Network Forensics Processes." In 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2021. http://dx.doi.org/10.1109/icscee50312.2021.9498226.
Full textIkuesan, Adeyemi R., and Hein S. Venter. "Digital forensic readiness framework based on behavioral-biometrics for user attribution." In 2017 IEEE Conference on Application, Information and Network Security (AINS). IEEE, 2017. http://dx.doi.org/10.1109/ains.2017.8270424.
Full textReports on the topic "Network forensic framework analysis"
Klingbeil, Ralph S., and Keith M. Sullivan. A Proposed Framework for Network-Centric Maritime Warfare Analysis. Fort Belvoir, VA: Defense Technical Information Center, July 2003. http://dx.doi.org/10.21236/ada416829.
Full textHilbrecht, Margo, David Baxter, Alexander V. Graham, and Maha Sohail. Research Expertise and the Framework of Harms: Social Network Analysis, Phase One. GREO, December 2020. http://dx.doi.org/10.33684/2020.006.
Full textDuwadi, Kapil, Killian McKenna, Akshay Jain, Kajal Gaur, Adarsh Nagarajan, and David Palchak. An Analysis Framework for Distribution Network DER Integration Analysis in India: Distributed Solar in Tamil Nadu. Office of Scientific and Technical Information (OSTI), March 2021. http://dx.doi.org/10.2172/1774840.
Full textHaddad, Wassim M., and Quirino Balzano. A Network Thermodynamic Framework for the Analysis and Control Design of Large-Scale Dynamical Systems. Fort Belvoir, VA: Defense Technical Information Center, March 2006. http://dx.doi.org/10.21236/ada448643.
Full textBartone, Paul T., Mark A. Vaitkus, Kathleen Jocoy, Jocelyn V. Bartone, II Wells, Wells Linton, and Linda M. Organizational Analysis of the TIDES Project and the STAR-TIDES Network Using the 7-S Framework. Fort Belvoir, VA: Defense Technical Information Center, April 2013. http://dx.doi.org/10.21236/ada622059.
Full textPanneton, Brian, and James Adametz. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: HPC Data Reduction Framework. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada626053.
Full textHossain, Niamat Ullah Ibne, Raed Jaradat, Seyedmohsen Hosseini, Mohammad Marufuzzaman, and Randy Buchanan. A framework for modeling and assessing system resilience using a Bayesian network : a case study of an interdependent electrical infrastructure systems. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40299.
Full textBednar, Amy. Topological data analysis : an overview. Engineer Research and Development Center (U.S.), June 2021. http://dx.doi.org/10.21079/11681/40943.
Full text