Artículos de revistas sobre el tema "Network forensic framework analysis"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Network forensic framework analysis".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand y Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework". Security and Communication Networks 2021 (28 de agosto de 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.
Texto completoHaggerty, John, Alexander J. Karran, David J. Lamb y Mark Taylor. "A Framework for the Forensic Investigation of Unstructured Email Relationship Data". International Journal of Digital Crime and Forensics 3, n.º 3 (julio de 2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.
Texto completoN, Karthikeyan y Godwin Ponsam J. "Differentiation of Natural and Maliciously Induced Packet Loss in Wireless Network Using Forensic Analysis". International Journal of Engineering & Technology 7, n.º 4.6 (25 de septiembre de 2018): 354. http://dx.doi.org/10.14419/ijet.v7i4.6.28440.
Texto completoDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS". Criminalistics and Forensics, n.º 65 (18 de mayo de 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Texto completoChethana H. T. y Trisiladevi C. Nagavi. "A New Framework for Matching Forensic Composite Sketches With Digital Images". International Journal of Digital Crime and Forensics 13, n.º 5 (septiembre de 2021): 1–19. http://dx.doi.org/10.4018/ijdcf.20210901.oa1.
Texto completoBijalwan, Anchit, Vijender Kumar Solanki y Emmanuel Shubhakar Pilli. "BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES". Network Protocols and Algorithms 10, n.º 2 (28 de junio de 2018): 28. http://dx.doi.org/10.5296/npa.v10i2.13144.
Texto completoKhan, Muhammad Naeem Ahmed. "Multi-agent Based Forensic Analysis Framework for Infrastructures Involving Storage Networks". Proceedings of the National Academy of Sciences, India Section A: Physical Sciences 89, n.º 2 (14 de marzo de 2018): 291–309. http://dx.doi.org/10.1007/s40010-017-0473-3.
Texto completoAnton Yudhana, Abdul Fadlil y Muhammad Rizki Setyawan. "Analysis of Skype Digital Evidence Recovery based on Android Smartphones Using the NIST Framework". Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, n.º 4 (17 de agosto de 2020): 682–90. http://dx.doi.org/10.29207/resti.v4i4.2093.
Texto completoTurner, Adam B., Stephen McCombie y Allon J. Uhlmann. "Discerning payment patterns in Bitcoin from ransomware attacks". Journal of Money Laundering Control 23, n.º 3 (5 de julio de 2020): 545–89. http://dx.doi.org/10.1108/jmlc-02-2020-0012.
Texto completoReid, Shannon E. "Friendship Group Composition and Juvenile Institutional Misconduct". International Journal of Offender Therapy and Comparative Criminology 61, n.º 2 (28 de julio de 2016): 191–209. http://dx.doi.org/10.1177/0306624x15589737.
Texto completoKim, Hyungchan, Sungbum Kim, Yeonghun Shin, Wooyeon Jo, Seokjun Lee y Taeshik Shon. "Ext4 and XFS File System Forensic Framework Based on TSK". Electronics 10, n.º 18 (20 de septiembre de 2021): 2310. http://dx.doi.org/10.3390/electronics10182310.
Texto completoTeunis, Peter, Janneke C. M. Heijne, Faizel Sukhrie, Jan van Eijkeren, Marion Koopmans y Mirjam Kretzschmar. "Infectious disease transmission as a forensic problem: who infected whom?" Journal of The Royal Society Interface 10, n.º 81 (6 de abril de 2013): 20120955. http://dx.doi.org/10.1098/rsif.2012.0955.
Texto completoBright, David y Chad Whelan. "On the relationship between goals, membership and network design in multi-agency “fusion” centres". Policing: An International Journal 42, n.º 3 (10 de junio de 2019): 441–54. http://dx.doi.org/10.1108/pijpsm-05-2018-0070.
Texto completoDemertzis, Konstantinos, Konstantinos Tsiknas, Dimitrios Takezis, Charalabos Skianis y Lazaros Iliadis. "Darknet Traffic Big-Data Analysis and Network Management for Real-Time Automating of the Malicious Intent Detection Process by a Weight Agnostic Neural Networks Framework". Electronics 10, n.º 7 (25 de marzo de 2021): 781. http://dx.doi.org/10.3390/electronics10070781.
Texto completoAkremi, Aymen, Hassen Sallay, Mohsen Rouached y Rafik Bouaziz. "Applying Digital Forensics to Service Oriented Architecture". International Journal of Web Services Research 17, n.º 1 (enero de 2020): 17–42. http://dx.doi.org/10.4018/ijwsr.2020010102.
Texto completoShao, Chenghui, Qixun Zhang, Yang Song y Dong Zhu. "Medical Information Forensics System Based on Convolutional Neural Network with Pattern Finding Prior". Journal of Medical Imaging and Health Informatics 10, n.º 5 (1 de mayo de 2020): 1098–104. http://dx.doi.org/10.1166/jmihi.2020.2893.
Texto completoAxenopoulos, Apostolos, Volker Eiselein, Antonio Penta, Eugenia Koblents, Ernesto La Mattina y Petros Daras. "A Framework for Large-Scale Analysis of Video \"in the Wild\" to Assist Digital Forensic Examination". IEEE Security & Privacy 17, n.º 1 (enero de 2019): 23–33. http://dx.doi.org/10.1109/msec.2018.2875851.
Texto completoZhang, Chongzhen, Yanli Chen, Yang Meng, Fangming Ruan, Runze Chen, Yidan Li y Yaru Yang. "A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques". Security and Communication Networks 2021 (25 de enero de 2021): 1–15. http://dx.doi.org/10.1155/2021/6610675.
Texto completoKeim, Yansi, Yung Han Yoon y Umit Karabiyik. "Digital Forensics Analysis of Ubuntu Touch on PinePhone". Electronics 10, n.º 3 (1 de febrero de 2021): 343. http://dx.doi.org/10.3390/electronics10030343.
Texto completoKaur, Sukhdilpreet y Amandeep Verma. "Ontological Engineering Approach Towards Botnet Detection in Network Forensics". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, n.º 9 (15 de septiembre de 2013): 1990–2001. http://dx.doi.org/10.24297/ijct.v10i9.1390.
Texto completoEl Alaoui El Abdallaoui, Hasna, Abdelaziz El Fazziki, Fatima Zohra Ennaji y Mohamed Sadgal. "An e-government crowdsourcing framework: suspect investigation and identification". International Journal of Web Information Systems 15, n.º 4 (7 de octubre de 2019): 432–53. http://dx.doi.org/10.1108/ijwis-11-2018-0079.
Texto completoDemertzis, Konstantinos, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez y Lazaros Iliadis. "The Next Generation Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for Efficient Defense against Adversarial Attacks". Big Data and Cognitive Computing 3, n.º 1 (10 de enero de 2019): 6. http://dx.doi.org/10.3390/bdcc3010006.
Texto completoDemertzis, Konstantinos, Panayiotis Kikiras, Nikos Tziritas, Salvador Sanchez y Lazaros Iliadis. "The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence". Big Data and Cognitive Computing 2, n.º 4 (22 de noviembre de 2018): 35. http://dx.doi.org/10.3390/bdcc2040035.
Texto completoPasko, Roman y Svitlana Terenchuk. "THE USE OF NEURO-FUZZY MODELS IN EXPERT SUPPORT SYSTEMS FOR FORENSIC BUILDING-TECHNICAL EXPERTISE". ScienceRise 2 (30 de abril de 2020): 10–18. http://dx.doi.org/10.21303/2313-8416.2020.001278.
Texto completoCHEN, ZHONGQIANG, ALEX DELIS y PETER WEI. "IDENTIFICATION AND MANAGEMENT OF SESSIONS GENERATED BY INSTANT MESSAGING AND PEER-TO-PEER SYSTEMS". International Journal of Cooperative Information Systems 17, n.º 01 (marzo de 2008): 1–51. http://dx.doi.org/10.1142/s0218843008001750.
Texto completoHubareva, V. M. "SOME SPECIFICS OF COST DETERMINING OF EQUIPMENT AND MACHINES TAKING INTO ACCOUNT QUALITY DEGRADATION DUE TO WEAR". Theory and Practice of Forensic Science and Criminalistics 18 (26 de diciembre de 2018): 498–504. http://dx.doi.org/10.32353/khrife.2018.57.
Texto completoLeukfeldt, E. R. y Thomas J. Holt. "Examining the Social Organization Practices of Cybercriminals in the Netherlands Online and Offline". International Journal of Offender Therapy and Comparative Criminology 64, n.º 5 (27 de diciembre de 2019): 522–38. http://dx.doi.org/10.1177/0306624x19895886.
Texto completoCohen, M. I. "PyFlag – An advanced network forensic framework". Digital Investigation 5 (septiembre de 2008): S112—S120. http://dx.doi.org/10.1016/j.diin.2008.05.016.
Texto completoFerreira, Sara, Mário Antunes y Manuel E. Correia. "A Dataset of Photos and Videos for Digital Forensics Analysis Using Machine Learning Processing". Data 6, n.º 8 (5 de agosto de 2021): 87. http://dx.doi.org/10.3390/data6080087.
Texto completoKhanuja, Harmeet Kaur. "A Framework for Database Forensic Analysis". Computer Science & Engineering: An International Journal 2, n.º 3 (30 de junio de 2012): 27–41. http://dx.doi.org/10.5121/cseij.2012.2303.
Texto completoRahman, Mohammad Arifur y Huzefa Rangwala. "IDMIL: an alignment-free Interpretable Deep Multiple Instance Learning (MIL) for predicting disease from whole-metagenomic data". Bioinformatics 36, Supplement_1 (1 de julio de 2020): i39—i47. http://dx.doi.org/10.1093/bioinformatics/btaa477.
Texto completoLIU, Dai-ping, Ming-wei ZHANG y Jia CHEN. "Blood examination-based network traffic analysis framework". Journal of Computer Applications 28, n.º 12 (26 de febrero de 2009): 3220–23. http://dx.doi.org/10.3724/sp.j.1087.2008.03220.
Texto completoBoscolo, R., C. Sabatti, J. C. Liao y V. P. Roychowdhury. "A Generalized Framework for Network Component Analysis". IEEE/ACM Transactions on Computational Biology and Bioinformatics 2, n.º 4 (octubre de 2005): 289–301. http://dx.doi.org/10.1109/tcbb.2005.47.
Texto completoFu, Zening, Yuhui Du y Vince D. Calhoun. "The Dynamic Functional Network Connectivity Analysis Framework". Engineering 5, n.º 2 (abril de 2019): 190–93. http://dx.doi.org/10.1016/j.eng.2018.10.001.
Texto completoZhang, Wen Xia, Yan Wang y Shu Hua Li. "Analysis Framework of Freemodbus". Advanced Materials Research 765-767 (septiembre de 2013): 1610–13. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1610.
Texto completoNuttachot Promrit, Anirach Mingkhwan, Supaporn Simcharoen y Nati Namvong. "Multi-Dimensional Visualization for Network Forensic Analysis". International Journal of Advancements in Computing Technology 4, n.º 5 (15 de marzo de 2012): 222–32. http://dx.doi.org/10.4156/ijact.vol4.issue5.27.
Texto completoPreszler, Jonathan, David K. Marcus, John F. Edens y Barbara E. McDermott. "Network analysis of psychopathy in forensic patients." Journal of Abnormal Psychology 127, n.º 2 (febrero de 2018): 171–82. http://dx.doi.org/10.1037/abn0000325.
Texto completoZhang, Chuanchao, Jiguang Wang, Chao Zhang, Juan Liu, Dong Xu y Luonan Chen. "Network stratification analysis for identifying function-specific network layers". Molecular BioSystems 12, n.º 4 (2016): 1232–40. http://dx.doi.org/10.1039/c5mb00782h.
Texto completoLakhal, Salem, Alain Martel, Muhittin Oral y Benoit Montreuil. "Network companies and competitiveness: A framework for analysis". European Journal of Operational Research 118, n.º 2 (octubre de 1999): 278–94. http://dx.doi.org/10.1016/s0377-2217(99)00026-0.
Texto completoMartínez, Víctor, Fernando Berzal y Juan-Carlos Cubero. "NOESIS: A Framework for Complex Network Data Analysis". Complexity 2019 (31 de octubre de 2019): 1–14. http://dx.doi.org/10.1155/2019/1439415.
Texto completoDalampira, Evropi‐Sofia y Stefanos A. Nastis. "Mapping Sustainable Development Goals: A network analysis framework". Sustainable Development 28, n.º 1 (2 de julio de 2019): 46–55. http://dx.doi.org/10.1002/sd.1964.
Texto completoKim, Hyun, Tae Kim y Sang Lee. "Framework for network modularization and Bayesian network analysis to investigate the perturbed metabolic network". BMC Systems Biology 5, Suppl 2 (2011): S14. http://dx.doi.org/10.1186/1752-0509-5-s2-s14.
Texto completoHamdi, Sally Dakheel y Abdulkareem Merhej Radhi. "Integrated Cyber Forensic for E-Mail Analysis Framework". Indian Journal of Science and Technology 12, n.º 27 (1 de julio de 2019): 1–13. http://dx.doi.org/10.17485/ijst/2019/v12i27/145999.
Texto completoHadjidj, Rachid, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szporer y Djamel Benredjem. "Towards an integrated e-mail forensic analysis framework". Digital Investigation 5, n.º 3-4 (marzo de 2009): 124–37. http://dx.doi.org/10.1016/j.diin.2009.01.004.
Texto completoArsić, Branko, Ljubiša Bojić, Ivan Milentijević, Petar Spalević y Dejan Rančić. "SYMBOLS: SOFTWARE FOR SOCIAL NETWORK ANALYSIS". Facta Universitatis, Series: Automatic Control and Robotics 17, n.º 3 (8 de enero de 2019): 205. http://dx.doi.org/10.22190/fuacr1803205a.
Texto completoZhu, Lei, Yi-Chang Chiu y Yuche Chen. "Road network abstraction approach for traffic analysis: framework and numerical analysis". IET Intelligent Transport Systems 11, n.º 7 (1 de septiembre de 2017): 424–30. http://dx.doi.org/10.1049/iet-its.2016.0287.
Texto completoFrançoisse, Kevin, Ilkka Kivimäki, Amin Mantrach, Fabrice Rossi y Marco Saerens. "A bag-of-paths framework for network data analysis". Neural Networks 90 (junio de 2017): 90–111. http://dx.doi.org/10.1016/j.neunet.2017.03.010.
Texto completoDoi, Suhail A. R. y Jan J. Barendregt. "A generalized pairwise modelling framework for network meta-analysis". International Journal of Evidence-Based Healthcare 16, n.º 4 (diciembre de 2018): 187–94. http://dx.doi.org/10.1097/xeb.0000000000000140.
Texto completoM, Durai Pandian. "PERFORMANCE ANALYSIS AND QOS FRAMEWORK OF FLY WİRELESS NETWORK". IRO Journal on Sustainable Wireless Systems 01, n.º 02 (16 de junio de 2019): 103–15. http://dx.doi.org/10.36548/jsws.2019.2.003.
Texto completo., Rashmi MR. "A NOVEL DISTRIBUTED INTRUSION DETECTION FRAMEWORK FOR NETWORK ANALYSIS". International Journal of Research in Engineering and Technology 04, n.º 08 (25 de agosto de 2015): 246–51. http://dx.doi.org/10.15623/ijret.2015.0408043.
Texto completo