DOC PREVIEW
UTD CS 4398 - Lecture #29 Network and File Forensics Papers

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsPapers to discussOptional Papers (DFRWS 2007)Digital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #29 Network and File Forensics PapersNovember 23, 2009Papers to discussFile Hound: A Forensics Tool for First Responders-http://dfrws.org/2005/proceedings/gillam_filehound.pdfMonitoring Access to Shared Memory-Mapped File-http://dfrws.org/2005/proceedings/sarmoria_memorymap.pdfNetwork Forensics Analysis with Evidence Graphs-http://dfrws.org/2005/proceedings/wang_evidencegraphs.pdfData Hiding in Journaling File Systems -http://dfrws.org/2005/proceedings/eckstein_journal.pdfEvaluating Commercial Counter-Forensic Tools-http://dfrws.org/2005/proceedings/geiger_couterforensics.pdfAutomatically Creating Realistic Targets for Digital Forensics Investigation -http://dfrws.org/2005/proceedings/adelstein_falcon.pdfOptional Papers (DFRWS 2007)Analyzing multiple logs for forensic evidence (OPTIONAL)-http://dfrws.org/2007/proceedings/p82-arasteh.pdfMassive threading: Using GPUs to increase the performance of digital forensics tools (OPTIOONAL)-http://dfrws.org/2007/proceedings/p73-marziale.pdfCarving contiguous and fragmented files with fast object validation


View Full Document

UTD CS 4398 - Lecture #29 Network and File Forensics Papers

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download Lecture #29 Network and File Forensics Papers
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #29 Network and File Forensics Papers and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #29 Network and File Forensics Papers 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?