Login / Signup
Network forensics investigation: behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network.
Abdullah Ayub Khan
Syed Asif Ali
Published in:
Int. J. Electron. Secur. Digit. Forensics (2021)
Keyphrases
</>
operating system
peer to peer
distributed systems
computer systems
databases
wireless sensor networks
security policies
microsoft windows