![Digital forensics / Data management / Computer networking / Network forensics / Transmission Control Protocol / Data center / IP address / HOLMES 2 / Windows / Computing / Concurrent computing / Distributed computing Digital forensics / Data management / Computer networking / Network forensics / Transmission Control Protocol / Data center / IP address / HOLMES 2 / Windows / Computing / Concurrent computing / Distributed computing](https://www.pdfsearch.io/img/9136d2a5553a400f8f75c0614ec7f871.jpg)
| Document Date: 2011-10-06 10:35:58 Open Document File Size: 179,31 KBShare Result on Facebook
City Iguaçu / / Company Distributed Computing Systems / C ONCLUSIONS FTP Client 1 Attacker / HTTP Client 1 FTP Client 2 Attacker / / Country Brazil / / Currency USD / / / Facility Host A's port / / IndustryTerm software vulnerability / compact network / communications security / host data collection tools / live analysis using such tools / enough network / on-line collection / in-line device / Internet Mathematics / heterogeneous network / gigabit networks / simpler solution / forensic tools / average networks / transfer network / Internet Measurement / search threads / heterogeneous networks / ne search granularities / data processing efficiency / guidance software / 1Gbps network / search space / application layer protocol / search granularity / passive tab device / forensics network / internal network / / OperatingSystem Windows Vista / Windows XP Professional / Microsoft Windows / / Organization IMC / / Person Fig / S. Kornexl / V / Bernhard Plattner / Mario Strasser / Stefan Engel / / Position investigator / NetWitness Investigator / / Product Holmes / Memoryze / / ProgrammingLanguage XML / / PublishedMedium LECTURE NOTES IN COMPUTER SCIENCE / / Technology LAN / XML / RAM / MAC address / gigabit / operating system / UDP / operating systems / application layer protocol / mobile devices / / URL http /
SocialTag |