Login / Signup
Forensic analysis of network packets from penetration test toolkits.
Da-Yu Kao
Yu-Siang Wang
Fu-Ching Tsai
Chien-Hung Chen
Published in:
ICACT (2018)
Keyphrases
</>
forensic analysis
flow analysis
ddos attacks
digital forensics
traffic analysis
computer networks
network traffic
traffic data
forensic science
wireless sensor networks
peer to peer
complex networks
video sequences
ip addresses
neighboring nodes
bandwidth requirements