2015 Science and Information Conference (SAI) 2015
DOI: 10.1109/sai.2015.7237305
|View full text |Cite
|
Sign up to set email alerts
|

Efficiency of network event logs as admissible digital evidence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 15 publications
(10 reference statements)
0
8
0
Order By: Relevance
“…The authors [8] performed an in-depth survey for events admissibility in the Irish court of law. Overall, the legal review is mainly focused on different primary areas: the admissibility and authentication of digital evidence and focuses mainly on Irish law.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors [8] performed an in-depth survey for events admissibility in the Irish court of law. Overall, the legal review is mainly focused on different primary areas: the admissibility and authentication of digital evidence and focuses mainly on Irish law.…”
Section: Previous Workmentioning
confidence: 99%
“…The authors purposed a new network forensics model [8] that can makes network events admissible in the court of law. The present model collects available logs from connected network devices, applies decision tree algorithm in order to filter anomaly intrusion, then re-route the logs to a central repository where events management functions are applied.…”
Section: A Simulating Sql-injection Cyber-attack Using Gns3mentioning
confidence: 99%
“…An in-depth survey for events admissibility in the Irish court of law is carried out in [34]. Overall, the legal review is mainly focused on different primary areas: the admissibility and authentication of digital evidence and focuses mainly on Irish law.…”
Section: Decriminalising Anonymous and Pseudonymousmentioning
confidence: 99%
“…The authors also presented an investigation learning methodology based on the proposed case study presented in [34]. The learning methodology consists into stages, stage one is build a network topology of the proposed case study and stage two is to create a network union matrix.…”
Section: Decriminalising Anonymous and Pseudonymousmentioning
confidence: 99%
See 1 more Smart Citation