Network forensics

Results: 176



#Item
11Computer forensics / FireEye / Cyberwarfare / Computer network security / Data security / Secure communication / Security information and event management / Computer security / Cloud computing / Network tap

THREAT ANALYTICS PLATFORM: CLOUD COLLECTOR EVENT GENERATOR THAT SECURELY CREATES AND STREAMS EVENT DATA TO THE FIREEYE THREAT ANALYTICS PLATFORM (TAP) OV E R V I E W

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2016-06-24 18:23:18
12Bitmap index / Data management / Data modeling / Database index / Extensible Storage Engine / Join / Relational database / Data / Column / Bit array / Bx-tree / Fractal tree index

VAST: A Unified Platform for Interactive Network Forensics Matthias Vallentin UC Berkeley Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2016-02-20 13:55:05
13Data management / Bitmap index / Pcap / Search engine indexing / Data / Extensible Storage Engine / Computer performance / Load / Decompression / NoSQL

Scalable Network Forensics by Matthias Vallentin A dissertation submitted in partial satisfaction of the

Add to Reading List

Source URL: matthias.vallentin.net

Language: English - Date: 2016-06-16 23:43:44
14

Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 6th, 2011 Forensics Tools for Social Network Security Vishal Almeida, Andrew Karnbad, Palak Shah, and Steve Kim Seidenberg School of CSIS, Pace Uni

Add to Reading List

Source URL: csis.pace.edu

Language: English - Date: 2011-05-02 15:15:03
    15

    Computer Network Internet Browsers Forensics

    Add to Reading List

    Source URL: www.secpoint.com

    Language: English - Date: 2013-11-26 07:21:58
      16

      Towards Large-Scale Incident Response and Interactive Network Forensics Matthias Vallentin UC Berkeley / ICSI Dissertation Proposal

      Add to Reading List

      Source URL: matthias.vallentin.net

      Language: English - Date: 2016-03-04 12:19:03
        17

        Pcap2Bubbles Extended Version (more text, more images, less jokes) Bubble your packets! By Sébastien Larinier / @Sebdraven & Guillaume Arcas / @y0m Network Forensics Paradigm

        Add to Reading List

        Source URL: archive.hack.lu

        Language: English - Date: 2013-10-27 02:36:00
          18

          Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Network Forensics Writeup Background: RL Forensics Inc. has a number of network stream captures it needs to process  for forensi

          Add to Reading List

          Source URL: cyberchallenge.com.au

          Language: English - Date: 2015-08-16 20:28:08
            19

            VAST: Interactive Network Forensics Matthias Vallentin BroCon August 5, 2015

            Add to Reading List

            Source URL: www.bro.org

            Language: English - Date: 2015-08-20 12:50:27
              20

              CprE 536: Computer and Network Forensics Cyber-attack prevention, detection, response, and investigation with the goals of counteracting cybercrime, cyberterrorism, and cyberpredators, and making the responsible persons/

              Add to Reading List

              Source URL: www.iac.iastate.edu

              Language: English - Date: 2014-01-28 12:04:31
                UPDATE