Literatura académica sobre el tema "Network forensic framework analysis"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Network forensic framework analysis".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Network forensic framework analysis"
Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand y Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework". Security and Communication Networks 2021 (28 de agosto de 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.
Texto completoHaggerty, John, Alexander J. Karran, David J. Lamb y Mark Taylor. "A Framework for the Forensic Investigation of Unstructured Email Relationship Data". International Journal of Digital Crime and Forensics 3, n.º 3 (julio de 2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.
Texto completoN, Karthikeyan y Godwin Ponsam J. "Differentiation of Natural and Maliciously Induced Packet Loss in Wireless Network Using Forensic Analysis". International Journal of Engineering & Technology 7, n.º 4.6 (25 de septiembre de 2018): 354. http://dx.doi.org/10.14419/ijet.v7i4.6.28440.
Texto completoDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS". Criminalistics and Forensics, n.º 65 (18 de mayo de 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Texto completoChethana H. T. y Trisiladevi C. Nagavi. "A New Framework for Matching Forensic Composite Sketches With Digital Images". International Journal of Digital Crime and Forensics 13, n.º 5 (septiembre de 2021): 1–19. http://dx.doi.org/10.4018/ijdcf.20210901.oa1.
Texto completoBijalwan, Anchit, Vijender Kumar Solanki y Emmanuel Shubhakar Pilli. "BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES". Network Protocols and Algorithms 10, n.º 2 (28 de junio de 2018): 28. http://dx.doi.org/10.5296/npa.v10i2.13144.
Texto completoKhan, Muhammad Naeem Ahmed. "Multi-agent Based Forensic Analysis Framework for Infrastructures Involving Storage Networks". Proceedings of the National Academy of Sciences, India Section A: Physical Sciences 89, n.º 2 (14 de marzo de 2018): 291–309. http://dx.doi.org/10.1007/s40010-017-0473-3.
Texto completoAnton Yudhana, Abdul Fadlil y Muhammad Rizki Setyawan. "Analysis of Skype Digital Evidence Recovery based on Android Smartphones Using the NIST Framework". Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, n.º 4 (17 de agosto de 2020): 682–90. http://dx.doi.org/10.29207/resti.v4i4.2093.
Texto completoTurner, Adam B., Stephen McCombie y Allon J. Uhlmann. "Discerning payment patterns in Bitcoin from ransomware attacks". Journal of Money Laundering Control 23, n.º 3 (5 de julio de 2020): 545–89. http://dx.doi.org/10.1108/jmlc-02-2020-0012.
Texto completoReid, Shannon E. "Friendship Group Composition and Juvenile Institutional Misconduct". International Journal of Offender Therapy and Comparative Criminology 61, n.º 2 (28 de julio de 2016): 191–209. http://dx.doi.org/10.1177/0306624x15589737.
Texto completoTesis sobre el tema "Network forensic framework analysis"
Fairbanks, Kevin D. "Forensic framework for honeypot analysis". Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.
Texto completoPluskal, Jan. "Framework for Captured Network Communication Processing". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-413326.
Texto completoSenthivel, Saranyan. "Automatic Forensic Analysis of PCCC Network Traffic Log". ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2394.
Texto completovan, den Berg Jelle y Filip Lagerholm. "Forensic Analysis of the Nintendo Switch". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42451.
Texto completoRajasekaran, Sathya Dev Squicciarini Anna C. Metzner John J. "Social network risk analysis and privacy framework". [University Park, Pa.] : Pennsylvania State University, 2009. http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-4812/index.html.
Texto completoSaltaformaggio, Brendan D. "Forensic Carving of Wireless Network Information from the Android Linux Kernel". ScholarWorks@UNO, 2012. http://scholarworks.uno.edu/honors_theses/20.
Texto completoAkkaya, Deniz y Fabien Thalgott. "Honeypots in network security". Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Texto completoDay by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.
Moe, Lwin P. "Cyber security risk analysis framework : network traffic anomaly detection". Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118536.
Texto completoCataloged from PDF version of thesis.
Includes bibliographical references (pages 84-86).
Cybersecurity is a growing research area with direct commercial impact to organizations and companies in every industry. With all other technological advancements in the Internet of Things (IoT), mobile devices, cloud computing, 5G network, and artificial intelligence, the need for cybersecurity is more critical than ever before. These technologies drive the need for tighter cybersecurity implementations, while at the same time act as enablers to provide more advanced security solutions. This paper will discuss a framework that can predict cybersecurity risk by identifying normal network behavior and detect network traffic anomalies. Our research focuses on the analysis of the historical network traffic data to identify network usage trends and security vulnerabilities. Specifically, this thesis will focus on multiple components of the data analytics platform. It explores the big data platform architecture, and data ingestion, analysis, and engineering processes. The experiments were conducted utilizing various time series algorithms (Seasonal ETS, Seasonal ARIMA, TBATS, Double-Seasonal Holt-Winters, and Ensemble methods) and Long Short-Term Memory Recurrent Neural Network algorithm. Upon creating the baselines and forecasting network traffic trends, the anomaly detection algorithm was implemented using specific thresholds to detect network traffic trends that show significant variation from the baseline. Lastly, the network traffic data was analyzed and forecasted in various dimensions: total volume, source vs. destination volume, protocol, port, machine, geography, and network structure and pattern. The experiments were conducted with multiple approaches to get more insights into the network patterns and traffic trends to detect anomalies.
by Lwin P. Moe.
S.M. in Engineering and Management
Mallek, Sabrine. "Social Network Analysis : Link prediction under the Belief Function Framework". Thesis, Artois, 2018. http://www.theses.fr/2018ARTO0204/document.
Texto completoSocial networks are large structures that depict social linkage between millions of actors. Social network analysis came out as a tool to study and monitor the patterning of such structures. One of the most important challenges in social network analysis is the link prediction problem. Link prediction investigates the potential existence of new associations among unlinked social entities. Most link prediction approaches focus on a single source of information, i.e. network topology (e.g. node neighborhood) assuming social data to be fully trustworthy. Yet, such data are usually noisy, missing and prone to observation errors causing distortions and likely inaccurate results. Thus, this thesis proposes to handle the link prediction problem under uncertainty. First, two new graph-based models for uniplex and multiplex social networks are introduced to address uncertainty in social data. The handled uncertainty appears at the links level and is represented and managed through the belief function theory framework. Next, we present eight link prediction methods using belief functions based on different sources of information in uniplex and multiplex social networks. Our proposals build upon the available information in data about the social network. We combine structural information to social circles information and node attributes along with supervised learning to predict new links. Tests are performed to validate the feasibility and the interest of our link prediction approaches compared to the ones from literature. Obtained results on social data from real-world demonstrate that our proposals are relevant and valid in the link prediction context
Padbidri, Jagan Mohan. "A network-cell based framework for multiscale analysis of granular materials". Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Dissertations/Spring2010/j_padbidri_041510.pdf.
Texto completoLibros sobre el tema "Network forensic framework analysis"
Lingeman, Jesse M. Network Inference in Molecular Biology: A Hands-on Framework. New York, NY: Springer New York, 2012.
Buscar texto completoGyamfi-Aidoo, Jacob. Africa Environment Information Network: Framework for capacity building in integrated environmental assessments and reporting in Africa. Nairobi, Kenya: United Nations Environment Programme, 2003.
Buscar texto completoBartone, Paul T. Organizational analysis of the TIDES project and the STAR-TIDES network using the 7-S framework. Washington, DC: Center for Technology & National Security Policy, National Defense University, 2013.
Buscar texto completoCouncil of Europe. Committee of Ministers. The use of analysis of deoxyribonucleic acid (DNA) within the framework of the criminal justice system: Recommendation No. R (92) 1 [of the Committee of Ministers] on 10 February 1992 and explanatory memorandum. Strasbourg: Council of Europe Press, 1993.
Buscar texto completoMinisters, Council of Europe Committee of. The use of analysis of deoxyribonucleic acid (DNA) within the framework of the criminal justice system: Recommendation no. R (92) 1 adopted by the Committee of Ministers of the Council of Europe on 10 February 1992 and explanatory memorandum. Strasbourg: Council of Europe, 1993.
Buscar texto completoScharnberg, Max. Textual analysis: a Scientific Apporach for Assessing Cases of Sexual Abuse.: Vol. 1: The Theoretical Framework, the Psychology of Lying, and Cases of Older Children.vol. 2: Cases of Younger Children, Including a Cases of Alleged Necrophilia, and the Shortcomings of Judicial Logic. Uppsala, Sweden: Uppsala universitet, Uppsala, Sweden, 1996.
Buscar texto completoDergunova, Viktoriya y Anastasiya Prokopova. Analysis of legal regulation and judicial practice of resolving disputes between parents about children. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1218051.
Texto completoBindemann, Markus, ed. Forensic Face Matching. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198837749.001.0001.
Texto completoCunningham, Daniel, Sean Everton y Philip Murphy. Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Rowman & Littlefield Publishers, Incorporated, 2016.
Buscar texto completoUnderstanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Rowman & Littlefield Publishers, Incorporated, 2016.
Buscar texto completoCapítulos de libros sobre el tema "Network forensic framework analysis"
Bhondele, Ankita, Shatrunjay Rawat y Shesha Shila Bharadwaj Renukuntla. "Network Management Framework for Network Forensic Analysis". En Advances in Intelligent Systems and Computing, 397–404. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13731-5_43.
Texto completoPilli, Emmanuel S., Ramesh C. Joshi y Rajdeep Niyogi. "A Framework for Network Forensic Analysis". En Information and Communication Technologies, 142–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15766-0_21.
Texto completoNimirthi, Pradeepthi, P. Venkata Krishna, Mohammad S. Obaidat y V. Saritha. "A Framework for Sentiment Analysis Based Recommender System for Agriculture Using Deep Learning Approach". En Social Network Forensics, Cyber Security, and Machine Learning, 59–66. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1456-8_5.
Texto completoJoshi, R. C. y Emmanuel S. Pilli. "Network Forensic Analysis". En Computer Communications and Networks, 107–29. London: Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7299-4_6.
Texto completoMorrissey, Sean. "Network Analysis". En iOS Forensic Analysis for iPhone, iPad, and iPod touch, 323–42. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3343-5_10.
Texto completoAshraf, Jamshaid y Omar Khadeer Hussain. "Ontology Usage Network Analysis Framework". En Web Technologies and Applications, 19–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37401-2_5.
Texto completoWarren, Christopher, Eman El-Sheikh y Nhien-An Le-Khac. "Privacy Preserving Internet Browsers: Forensic Analysis of Browzar". En Computer and Network Security Essentials, 369–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_21.
Texto completoHampton, Nikolai y Zubair A. Baig. "Timestamp Analysis for Quality Validation of Network Forensic Data". En Network and System Security, 235–48. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_16.
Texto completoKaur, Prabhjot, Anchit Bijalwan, R. C. Joshi y Amit Awasthi. "Network Forensic Process Model and Framework: An Alternative Scenario". En Advances in Intelligent Systems and Computing, 493–502. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-5903-2_50.
Texto completoKaushik, Atul Kant, Emmanuel S. Pilli y R. C. Joshi. "Network Forensic Analysis by Correlation of Attacks with Network Attributes". En Information and Communication Technologies, 124–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15766-0_18.
Texto completoActas de conferencias sobre el tema "Network forensic framework analysis"
Benchikha, Nadia, Mohamed Krim, Khaled Zeraoulia y Chafika Benzaid. "IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework". En 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, 2016. http://dx.doi.org/10.1109/ccc.2016.23.
Texto completoSingh, Kumar Shanu, Annie Irfan y Neelam Dayal. "Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks". En 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036214.
Texto completoSivaprasad, Abirami. "Secured Proactive Network Forensic Framework". En 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC). IEEE, 2017. http://dx.doi.org/10.1109/ctceec.2017.8455003.
Texto completoKang, Seung-hoon y Juho Kim. "Network Forensic Analysis Using Visualization Effect". En 2008 International Conference on Convergence and Hybrid Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/ichit.2008.165.
Texto completoAhmad, Samsiah, Nor Liza Saad, Zalikha Zulkifli y Siti Hajar Nasaruddin. "Proposed network forensic framework for analyzing IaaS cloud computing environment". En 2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC). IEEE, 2015. http://dx.doi.org/10.1109/ismsc.2015.7594043.
Texto completoHuang, Shin-Ying y Yennun Huang. "Network Forensic Analysis Using Growing Hierarchical SOM". En 2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW). IEEE, 2013. http://dx.doi.org/10.1109/icdmw.2013.66.
Texto completoChang, Cheng-Yue y Jing-Sha He. "Network Forensic Analysis via Vulnerability Evidence Reasoning". En 2016 International Conference on Computer Engineering and Information Systems. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/ceis-16.2016.48.
Texto completoPanta, Franck Jeveme, André Péninou y Florence Sèdes. "Negative filtering of CCTV Content - forensic video analysis framework". En ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3407069.
Texto completoGhabban, Fahad M., Ibrahim M. Alfadli, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm y Mahmoud Ahmad Al-Khasawneh. "Comparative Analysis of Network Forensic Tools and Network Forensics Processes". En 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2021. http://dx.doi.org/10.1109/icscee50312.2021.9498226.
Texto completoIkuesan, Adeyemi R. y Hein S. Venter. "Digital forensic readiness framework based on behavioral-biometrics for user attribution". En 2017 IEEE Conference on Application, Information and Network Security (AINS). IEEE, 2017. http://dx.doi.org/10.1109/ains.2017.8270424.
Texto completoInformes sobre el tema "Network forensic framework analysis"
Klingbeil, Ralph S. y Keith M. Sullivan. A Proposed Framework for Network-Centric Maritime Warfare Analysis. Fort Belvoir, VA: Defense Technical Information Center, julio de 2003. http://dx.doi.org/10.21236/ada416829.
Texto completoHilbrecht, Margo, David Baxter, Alexander V. Graham y Maha Sohail. Research Expertise and the Framework of Harms: Social Network Analysis, Phase One. GREO, diciembre de 2020. http://dx.doi.org/10.33684/2020.006.
Texto completoDuwadi, Kapil, Killian McKenna, Akshay Jain, Kajal Gaur, Adarsh Nagarajan y David Palchak. An Analysis Framework for Distribution Network DER Integration Analysis in India: Distributed Solar in Tamil Nadu. Office of Scientific and Technical Information (OSTI), marzo de 2021. http://dx.doi.org/10.2172/1774840.
Texto completoHaddad, Wassim M. y Quirino Balzano. A Network Thermodynamic Framework for the Analysis and Control Design of Large-Scale Dynamical Systems. Fort Belvoir, VA: Defense Technical Information Center, marzo de 2006. http://dx.doi.org/10.21236/ada448643.
Texto completoBartone, Paul T., Mark A. Vaitkus, Kathleen Jocoy, Jocelyn V. Bartone, II Wells, Wells Linton y Linda M. Organizational Analysis of the TIDES Project and the STAR-TIDES Network Using the 7-S Framework. Fort Belvoir, VA: Defense Technical Information Center, abril de 2013. http://dx.doi.org/10.21236/ada622059.
Texto completoPanneton, Brian y James Adametz. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: HPC Data Reduction Framework. Fort Belvoir, VA: Defense Technical Information Center, agosto de 2015. http://dx.doi.org/10.21236/ada626053.
Texto completoHossain, Niamat Ullah Ibne, Raed Jaradat, Seyedmohsen Hosseini, Mohammad Marufuzzaman y Randy Buchanan. A framework for modeling and assessing system resilience using a Bayesian network : a case study of an interdependent electrical infrastructure systems. Engineer Research and Development Center (U.S.), abril de 2021. http://dx.doi.org/10.21079/11681/40299.
Texto completoBednar, Amy. Topological data analysis : an overview. Engineer Research and Development Center (U.S.), junio de 2021. http://dx.doi.org/10.21079/11681/40943.
Texto completo