2011 24th Canadian Conference on Electrical and Computer Engineering(CCECE) 2011
DOI: 10.1109/ccece.2011.6030658
|View full text |Cite
|
Sign up to set email alerts
|

Emerging threats, risks and mitigation strategies in network forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…The literature comes with many surveys related to threat management [21]. However, some of them or too outdated for such a fast-moving research area [22] [23]. Others do not focus on threat hunting [24].…”
Section: Existing Surveysmentioning
confidence: 99%
See 4 more Smart Citations
“…The literature comes with many surveys related to threat management [21]. However, some of them or too outdated for such a fast-moving research area [22] [23]. Others do not focus on threat hunting [24].…”
Section: Existing Surveysmentioning
confidence: 99%
“…Cyber intrusions are evolving exponentially as computer systems advance [22], [34]. The articles [22] [23] [35] all observed a consistent rise of threats and vulnerabilities that are constantly challenging the updated computers, mobile phones, and other products.…”
Section: Surveys On Emerging Threatsmentioning
confidence: 99%
See 3 more Smart Citations