2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering 2009
DOI: 10.1109/sadfe.2009.16 View full text |Buy / Rent full text
|
|
Help me understand this report

Search citation statements

Order By: Relevance
Select...
2
1
0
3
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

0
3
0
Order By: Relevance
“…• aggregated (merged, optimal, and maximal) network evidence using rules 5, 6, 7, 8, and 9; • coherent, possible, and provable attack scenarios based on both system evidence and an aggregated network evidence, using rules 10,11,12,13,14,15,16, and 17. The more network evidence there is, the simpler is the proof and the fewer is the number of possible candidate attacks.…”
Section: Rules For Aggregating the Network Evidencementioning
See 2 more Smart Citations
Create an account to read the remaining citation statements from this report. You will also get access to:
  • Search over 1.2b+ citation statments to see what is being said about any topic in the research literature
  • Advanced Search to find publications that support or contrast your research
  • Citation reports and visualizations to easily see what publications are saying about each other
  • Browser extension to see Smart Citations wherever you read research
  • Dashboards to evaluate and keep track of groups of publications
  • Alerts to stay on top of citations as they happen
  • Automated reference checks to make sure you are citing reliable research in your manuscripts
  • 7 day free preview of our premium features.

Trusted by researchers and organizations around the world

Over 130,000 students researchers, and industry experts at use scite

See what students are saying

rupbmjkragerfmgwileyiopcupepmcmbcthiemesagefrontiersapsiucrarxivemeralduhksmucshluniversity-of-gavle
“…• aggregated (merged, optimal, and maximal) network evidence using rules 5, 6, 7, 8, and 9; • coherent, possible, and provable attack scenarios based on both system evidence and an aggregated network evidence, using rules 10,11,12,13,14,15,16, and 17. The more network evidence there is, the simpler is the proof and the fewer is the number of possible candidate attacks.…”
Section: Rules For Aggregating the Network Evidencementioning
“…The proposal deals with both evidence collection mechanisms in wireless multihop networks, and inference of provable attack scenarios starting from evidence collected at different locations in the network and the victim system. It is worth noting that a special case of the results have been addressed in [10], where a first version of an inference system was proposed to generate theorems regarding potential attack scenarios executed in an ad hoc network. The work in [10] was unable to cope with investigation in sensor networks as nodes may be scheduled to sleep and wake up to save energy, which affects the process of evidence collection and reassembly.…”
Section: Introductionmentioning
See 1 more Smart Citation