in network forensics log analysis techniques...

Post on 29-Mar-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Log Analysis Techniques using Clusteringin Network Forensics

By Imam Riadi

WORD COUNT 5105 TIME SUBMITTED 18-JUL-2017 09:41AM

PAPER ID 30571450

3%SIMILARITY INDEX

1

2

3

4

5

6

7

8

EXCLUDE QUOTES OFF

EXCLUDE BIBLIOGRAPHY OFF

EXCLUDE MATCHES OFF

Log Analysis Techniques using Clustering in NetworkForensicsORIGINALITY REPORT

PRIMARY SOURCES

issuu.comInternet

akademik.unsoed.ac.idInternet

interscience.inInternet

Zhu, Ying. "Attack Pattern Discovery in ForensicInvestigation of Network Attacks", IEEE Journal onSelected Areas in Communications, 2011.Crossref

www.forensicmag.comInternet

www.computersecuritydirectory.comInternet

www.dronasoft.comInternet

www.sersc.orgInternet

40 words — 1%

24 words — < 1%

21 words — < 1%

21 words — < 1%

10 words — < 1%

10 words — < 1%

10 words — < 1%

9 words — < 1%

top related