About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Workshop on Knowledge Discovery and Data Mining

Research Article

Cooperation Forensic Computing Research

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/wkdd.2008.2687,
        author={Youdong ZHANG},
        title={Cooperation Forensic Computing Research},
        proceedings={1st International ICST Workshop on Knowledge Discovery and Data Mining},
        publisher={ACM},
        proceedings_a={WKDD},
        year={2010},
        month={5},
        keywords={},
        doi={10.4108/wkdd.2008.2687}
    }
    
  • Youdong ZHANG
    Year: 2010
    Cooperation Forensic Computing Research
    WKDD
    ACM
    DOI: 10.4108/wkdd.2008.2687
Youdong ZHANG1,*
  • 1: Department of Computer Engineering, Huaiyin Institute of Technology, Huaian, China.
*Contact email: z.yd@163.com

Abstract

The network forensic computing is faced with the question of the complex network intrusion analyses. So a new concept of cooperation forensic computing is defined. Through to extend the theory of function dependency, a new method called probability function dependency relationships is proposed. Combined it with the Bayesian network and K2 algorithm, the network forensic computing algorithm called CFA is proposed. For the complex network attack, CFA is able to synthesize the various forensic data resource to reappearance the crime scenario intuitionally and realize the network forensic analysis effectively.

Published
2010-05-16
Publisher
ACM
Modified
2010-05-16
http://dx.doi.org/10.4108/wkdd.2008.2687
Copyright © 2008–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL