Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Christian Payne"'
Publikováno v:
IEEE Access, Vol 8, Pp 60664-60675 (2020)
A forensic investigator creates a timeline from a forensic disk image after an occurrence of a security incident. This procedure aims to acquire the time for all events identified from the investigated artifacts. An investigator usually looks for eve
Externí odkaz:
https://doaj.org/article/f6e41c66aa7c4b09a5d7a38dd66d3a2b
Autor:
Lorraine Finlay, Christian Payne
Publikováno v:
AJIL Unbound, Vol 113, Pp 202-206 (2019)
In late 2018, the U.S. Secretary of Homeland Security suggested that “cyber-attacks now exceed the risk of physical attacks.” Yet the law has not kept pace with this reality. In particular, identifying who is responsible for a cyberattack makes i
Externí odkaz:
https://doaj.org/article/946ddf1d2eec4b71b5de54597edfb25b
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 18:2136-2148
The purpose of sentiment analysis is to detect an opinion or polarity in text data. We can apply such an analysis to detect negative sentiment, which represents the anomalous activities in operating system (OS) logs. Existing methods involve manual s
Autor:
Kolton Cobb, Christian Payne, Rebekah Lavender, Tijana Simovic, Ryan A. Harris, Jennifer Pollock, Babak Baban, David Mannino, Patrick Nana‐Sinkam, Paula Rodriguez Miguelez
Publikováno v:
The FASEB Journal. 36
Publikováno v:
IEEE Access, Vol 8, Pp 60664-60675 (2020)
A forensic investigator creates a timeline from a forensic disk image after an occurrence of a security incident. This procedure aims to acquire the time for all events identified from the investigated artifacts. An investigator usually looks for eve
Publikováno v:
Digital Investigation. 29:1-20
Event logs are one of the most important sources of digital evidence for forensic investigation because they record essential activities on the system. In this paper, we present a comprehensive literature survey of the forensic analysis on operating
Autor:
Christian Payne, Lorraine Finlay
Publikováno v:
AJIL Unbound. 113:202-206
In late 2018, the U.S. Secretary of Homeland Security suggested that “cyber-attacks now exceed the risk of physical attacks.” Yet the law has not kept pace with this reality. In particular, identifying who is responsible for a cyberattack makes i
Publikováno v:
ACSW
ion of event logs is the creation of a template that contains the most common words representing all members in a group of event log entries. Abstraction helps the forensic investigators to obtain an overall view of the main events in a log file. Exi
Publikováno v:
Digital Investigation. 21:76-87
Attacks on operating system access control have become a significant and increasingly common problem. This type of security threat is recorded in a forensic artifact such as an authentication log. Forensic investigators will generally examine the log
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030150310
AINA
AINA
Computer security events are recorded in several log files. It is necessary to cluster these logs to discover security threats, detect anomalies, or identify a particular error. A problem arises when large quantities of security log data need to be c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::37785ce99e7a180fe8ba97730e2bd9c9
https://doi.org/10.1007/978-3-030-15032-7_77
https://doi.org/10.1007/978-3-030-15032-7_77