Sign in

A Complexity Based Forensic Analysis of the Trojan Horse Defence.

Richard E. OverillJantje A. M. Silomon
Published in: ARES (2011)
Keyphrases
  • forensic analysis
  • flow analysis
  • computational complexity
  • network analysis
  • worst case
  • distributed databases
  • ddos attacks
  • national security
  • digital forensics