@inproceedings{ieong:hal-01523719, TITLE = {{Validation of Rules Used in Foxy Peer-to-Peer Network Investigations}}, AUTHOR = {Ieong, Ricci and Chow, Kam-Pui and Lai, Pierre}, URL = {https://inria.hal.science/hal-01523719}, NOTE = {Part 5: NETWORK FORENSICS}, BOOKTITLE = {{8th International Conference on Digital Forensics (DF)}}, ADDRESS = {Pretoria, South Africa}, EDITOR = {Gilbert Peterson and Sujeet Shenoi}, PUBLISHER = {{Springer}}, SERIES = {Advances in Digital Forensics VIII}, VOLUME = {AICT-383}, PAGES = {231-245}, YEAR = {2012}, MONTH = Jan, DOI = {10.1007/978-3-642-33962-2\_16}, KEYWORDS = {Peer-to-peer networks ; Foxy ; first seeder ; network simulation}, PDF = {https://inria.hal.science/hal-01523719/file/978-3-642-33962-2_16_Chapter.pdf}, HAL_ID = {hal-01523719}, HAL_VERSION = {v1}, }