TY - JOUR AU - Beebe, N. i. c. o. l. e. L. a. n. g. AU - Clark, J. a. n. G. u. y. n. e. s. PY - 2007 DA - 2007// TI - A hierarchical, objectives-based framework for the digital investigations process JO - Digital Investigation VL - 2 UR - https://doi.org/10.1016/j.diin.2005.04.002 DO - 10.1016/j.diin.2005.04.002 ID - Beebe2007 ER - TY - JOUR AU - Stephenson, P. e. t. e. r. PY - 2003 DA - 2003// TI - Modeling of post-incident root cause analysis JO - International Journal of Digital Evidence VL - 2 ID - Stephenson2003 ER - TY - CHAP AU - Stallard, T. y. e. AU - Levitt, K. a. r. l. PY - 2003 DA - 2003// TI - Automated analysis for digital forensic science: Semantic integrity checking BT - Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA ID - Stallard2003 ER - TY - JOUR AU - Gladyshev, P. a. v. e. l. PY - 2005 DA - 2005// TI - Finite State Machine Analysis of a Blackmail Investigation JO - International Journal of Digital Evidence VL - 4 ID - Gladyshev2005 ER - TY - JOUR AU - Brian, D. PY - 2006 DA - 2006// TI - Carrier and Eugene H. Spafford. Categories of digital investigation analysis techniques based on the computer history model JO - Digital Investigation Journal VL - 3 ID - Brian2006 ER - TY - CHAP AU - Willassen, S. v. e. i. n. Y. n. g. v. a. r. PY - 2008 DA - 2008// TI - Timestamp evidence correlation by model based clock hypothesis testing BT - Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia ID - Willassen2008 ER - TY - JOUR AU - Arasteha, A. l. i. R. e. z. a. AU - Debbabi, M. o. u. r. a. d. AU - Sakhaa, A. s. s. a. a. d. AU - Saleh, M. o. h. a. m. e. d. PY - 2007 DA - 2007// TI - Analyzing multiple logs for forensic evidence JO - Digital Investigation VL - 4 UR - https://doi.org/10.1016/j.diin.2007.06.013 DO - 10.1016/j.diin.2007.06.013 ID - Arasteha2007 ER - TY - CHAP AU - Rekhis, S. l. i. m. AU - Boudriga, N. o. u. r. e. d. d. i. n. e. PY - 2011 DA - 2011// TI - Logic-based approach for digital forensic investigation in communication networks BT - Computers & Security ID - Rekhis2011 ER - TY - JOUR AU - Ding, S. h. u. o. PY - 2008 DA - 2008// TI - A survey on integrating manets with the internet: Challenges and designs JO - Computer Communications VL - 31 UR - https://doi.org/10.1016/j.comcom.2008.04.014 DO - 10.1016/j.comcom.2008.04.014 ID - Ding2008 ER - TY - CHAP AU - Rekhis, S. l. i. m. AU - Boudriga, N. o. u. r. e. d. d. i. n. e. PY - 2009 DA - 2009// TI - A formal rule-based scheme for digital investigation in wireless ad-hoc networks BT - Proceedings of Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, California, USA ID - Rekhis2009 ER - TY - STD TI - Gladyshev Pavel, Patel Ahmed: Formalising event time bounding in digital investigations. International Journal of Digital Evidence 2005., 4(2): ID - ref11 ER - TY - CHAP AU - Willassen, S. v. e. i. n. PY - 2008 DA - 2008// TI - Hypothesis-based investigation of digital timestamps BT - Proceedings of Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan ID - Willassen2008 ER - TY - JOUR AU - Rekhis, S. l. i. m. AU - Boudriga, N. o. u. r. e. d. d. i. n. e. PY - 2009 DA - 2009// TI - Visibility: a novel concept for characterising provable network digital evidences JO - International journal of security and networks VL - 4 UR - https://doi.org/10.1504/IJSN.2009.028670 DO - 10.1504/IJSN.2009.028670 ID - Rekhis2009 ER - TY - CHAP AU - Slay, J. i. l. l. AU - Turnbull, B. e. n. j. a. m. i. n. PY - 2006 DA - 2006// TI - The need for a technical approach to digital forensic evidence collection for wireless technologies BT - Proceedings of the 2006 IEEE Workshop on Information Assurance, West Point, NY UR - https://doi.org/10.1109/IAW.2006.1652086 DO - 10.1109/IAW.2006.1652086 ID - Slay2006 ER - TY - CHAP AU - Huang, Y. i. a. n. AU - Lee, W. e. n. k. e. PY - 2005 DA - 2005// TI - Hotspotbased traceback for mobile ad hoc networks BT - Proceedings of The ACM Workshop on Wireless Security (WiSe 2005), Cologne, Germany ID - Huang2005 ER - TY - CHAP AU - Kim, Y. o. n. g. j. i. n. AU - Helmy, A. h. m. e. d. PY - 2005 DA - 2005// TI - SWAT: Small world-based attacker traceback in ad-hoc networks BT - The Second Annual International Conference on Mobile and Ubiquitous Systems, San Diego, USA ID - Kim2005 ER - TY - JOUR AU - Rekhis, S. l. i. m. AU - Boudriga, N. o. u. r. e. d. d. i. n. e. PY - 2009 DA - 2009// TI - Investigating attack scenarios in multihop wireless systems JO - Journal of networks VL - 4 UR - https://doi.org/10.4304/jnw.4.7.539-551 DO - 10.4304/jnw.4.7.539-551 ID - Rekhis2009 ER - TY - JOUR AU - Ghosh, S. o. m. n. a. t. h. AU - Veeraraghavan, P. r. a. k. a. s. h. AU - Singh, S. a. m. a. r. AU - Zhang, L. e. i. PY - 2009 DA - 2009// TI - Performance of a wireless sensor network mac protocol with a global sleep schedule JO - International Journal of Multimedia and Ubiquitous Engineering VL - 4 ID - Ghosh2009 ER - TY - JOUR AU - Huang, L. e. i. AU - Liu, L. i. x. i. a. n. g. PY - 2008 DA - 2008// TI - Extended watchdog mechanism for wireless sensor networks JO - Journal of Information and Computing Science VL - 3 ID - Huang2008 ER - TY - JOUR AU - Snoeren, A. l. e. x. C. AU - Partridge, C. r. a. i. g. AU - Sanchez, L. u. i. s. A. AU - Jones, C. h. r. i. s. t. i. n. e. E. AU - Tchakountio, F. a. b. r. i. c. e. AU - Kent, S. t. e. p. h. e. n. T. AU - Timothy Strayer, W. PY - 2001 DA - 2001// TI - Hash-based IP traceback JO - ACM SIGCOMM Computer Communication Review VL - 31 UR - https://doi.org/10.1145/964723.383060 DO - 10.1145/964723.383060 ID - Snoeren2001 ER - TY - CHAP AU - Mehta, V. a. i. b. h. a. v. AU - Bartzis, C. o. n. s. t. a. n. t. i. n. o. s. AU - Zhu, H. a. i. f. e. n. g. AU - Clarke, E. d. m. u. n. d. M. AU - Wing, J. e. a. n. n. e. t. t. e. M. PY - 2006 DA - 2006// TI - Ranking attack graphs BT - Proceedings of 9th International Symposium On Recent Advances In Intrusion Detection, Hamburg, Germany UR - https://doi.org/10.1007/11856214_7 DO - 10.1007/11856214_7 ID - Mehta2006 ER - TY - CHAP AU - Odubiyi, J. i. d. e. B. AU - O'Brien, C. a. s. e. y. W. PY - 2006 DA - 2006// TI - Information security attack tree modeling BT - proceedings of Seventh Workshop on Education in Computer Security (WECS7), Monterey, California ID - Odubiyi2006 ER - TY - JOUR AU - Leontie, E. u. g. e. n. AU - Bloom, G. e. d. a. r. e. AU - Gelbart, O. l. g. a. AU - Narahari, B. h. a. g. i. r. a. t. h. AU - Simha, R. a. h. u. l. PY - 2010 DA - 2010// TI - A compiler-hardware technique for protecting against buffer overflow attacks JO - Journal of Information Assurance and Security VL - 5 ID - Leontie2010 ER -