From post

ECF - Event Correlation for Forensics.

, , и . Australian Computer, Network & Information Forensics Conference, School of Computer and Information Science, Edith Cowan University, Western Australia, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dealing with the Problem of Cybercrime., , , и . ICDF2C, том 53 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 1-18. Springer, (2010)Detection of Anomalies from User Profiles Generated from System Logs., , и . AISC, том 116 из CRPIT, стр. 23-32. Australian Computer Society, (2011)The CASS Shell., , , , и . Cryptography: Policy and Algorithms, том 1029 из Lecture Notes in Computer Science, стр. 313-325. Springer, (1995)Money Laundering and FATF Compliance by the International Community., , , и . HCC, том 328 из IFIP Advances in Information and Communication Technology, стр. 86-97. Springer, (2010)A Framework for Improved Adolescent and Child Safety in MMOs., , и . ASONAM, стр. 33-40. IEEE Computer Society, (2010)A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX., , , , и . ACSAC, стр. 49-58. IEEE Computer Society, (2005)ProtectOS: Operating System and Hardware Support for Small Objects., и . ACISP, том 1270 из Lecture Notes in Computer Science, стр. 102-113. Springer, (1997)Enhancing Child Safety in MMOGs., , и . The Influence of Technology on Social Network Analysis and Mining, том 6 из Lecture Notes in Social Networks, Springer, (2013)Internet Service Cluster Dispatching Via a TCP Redirection Option., и . International Conference on Internet Computing, стр. 381-387. CSREA Press, (2003)Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks., , и . ARES, стр. 47-55. IEEE Computer Society, (2008)