Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Yoginder S. Dandass"'
Publikováno v:
Journal of Digital Forensic Practice. 2:95-104
Discovering known illicit material on digital storage devices is an important component of a digital forensic investigation. Using existing data carving techniques and tools, it is typically difficult to recover remaining fragments of deleted illicit
Autor:
Jerry Clarke, Robert J. Moorhead, Paul Adams, Travis Atkison, Joel Martin, Rhonda J. Vickery, A. Cedilnik, Yoginder S. Dandass
Publikováno v:
Journal of Physics: Conference Series. 46:545-549
This paper describes recent work on securing a Web-browser-based remote visualization capability for large datasets. The results from a security performance study are presented.
Publikováno v:
SIMULATION. 82:523-541
In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results
Publikováno v:
Cluster Computing. 7:303-315
Fault tolerance in parallel systems has traditionally been achieved through a combination of redundancy and checkpointing methods. This notion has also been extended to message-passing systems with user-transparent process checkpointing and message l
Publikováno v:
Proceedings of the 42nd Hawaii International Conference on System Sciences
42nd Hawaii International Conference on System Sciences
42nd Hawaii International Conference on System Sciences, Jan 2009, Waikoloa, United States. 10 p
HICSS
42nd Hawaii International Conference on System Sciences
42nd Hawaii International Conference on System Sciences, Jan 2009, Waikoloa, United States. 10 p
HICSS
International audience; The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensics. Although reconstruction of image files from
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e5b13b373abe730df49b2e2faa6b9344
https://hal.archives-ouvertes.fr/hal-00350962/document
https://hal.archives-ouvertes.fr/hal-00350962/document
Publikováno v:
HICSS
This paper introduces a set intrusion detection system rules for MODBUS/TCP and MODBUS over Serial Line systems. The rules described in this paper were derived from a vulnerability analysis of the MODBUS protocols. In total the paper describes 50 sig
Publikováno v:
Computer and Information Science. 5
The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most cost
Publikováno v:
HICSS
MODBUS RTU/ASCII Snort is software to retrofit serial based industrial control systems to add Snort intrusion detection and intrusion prevention capabilities. This article discusses the need for such a system by describing 4 classes of intrusion vuln
Publikováno v:
HICSS
The study of design issues and implementation techniques for hyper visors is becoming an increasingly important aspect of operating systems pedagogy. There is a demand for students, especially in the field of information assurance, who understand the
Publikováno v:
CSIIRW
This paper describes the Mississippi State University Supervisory Control and Data Acquisition (SCADA) security laboratory and Power and Energy Research laboratory. This laboratory combines process control systems from multiple critical infrastructur