Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

Author: He Jingsha   Chang Chengyue   He Peng   Pathan Muhammad Salman  

Publisher: MDPI

E-ISSN: 1999-5903|8|4|54-54

ISSN: 1999-5903

Source: Future Internet, Vol.8, Iss.4, 2016-11, pp. : 54-54

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract