Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : National Center for Forensic Science
labStructName_s : Norwegian Information Security Laboratory
labStructName_s : Software Research Institute
Image document

Identifying Malware Using Cross-Evidence Correlation

Anders Flaglien , Katrin Franke , Andre Arnes
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.169-182, ⟨10.1007/978-3-642-24212-0_13⟩
Conference papers hal-01569545v1
Image document

TRAWL – A Traffic Route Adapted Weighted Learning Algorithm

Enda Fallon , Liam Murphy , John Murphy , Chi Ma
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.1-14, ⟨10.1007/978-3-642-21560-5_1⟩
Conference papers hal-01583661v1
Image document

Forensic Analysis of Plug Computers

Scott Conrad , Greg Dorn , Philip Craiger
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.275-287, ⟨10.1007/978-3-642-24212-0_21⟩
Conference papers hal-01569554v1