close
1.

電子ブック

EB
Philip Craiger, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer New York, 2007
所蔵情報: loading…
2.

電子ブック

EB
Indrajit Ray, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
3.

電子ブック

EB
Eric Goetz, Sujeet Shenoi, J?rg Siekmann
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
4.

電子ブック

EB
Mauricio Papa, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Emergent Risks in Critical Infrastructures / Scott Dynes1:
Cyberspace Policy for Critical Infrastructures / Dorsey Wilkin ; Richard Raines ; Paul Williams ; Kenneth Hopkinson2:
Infrastructure Security / Part II:
Security Assessment of a Turbo-Gas Power Plant / Marcelo Masera ; Igor Nai Fovino ; Rafal Leszczyna3:
Detecting Cyber Attacks on Nuclear Power Plants / Julian Rrushi ; Roy Campbell4:
Control Systems Security / Part III:
Applying Trusted Network Technology to Process Control Systems / Hamed Okhravi ; David Nicol5:
Towards a Taxonomy of Attacks Against Energy Control Systems / Terry Fleury ; Himanshu Khurana ; Von Welch6:
Attribution of Cyber Attacks on Process Control Systems / Jeffrey Hunker ; Robert Hutchinson ; Jonathan Margulies7:
Modeling and Detecting Anomalies in SCADA Systems / Nils Svendsen ; Stephen Wolthusen8:
Assessing the Integrity of Field Devices in Modbus Networks / Ryan Shayto ; Brian Porter ; Rodrigo Chandia ; Mauricio Papa ; Sujeet Shenoi9:
Designing Security-Hardened Microkernels for Field Devices / Jeffrey Hieb ; James Graham10:
Combating Memory Corruption Attacks on SCADA Devices / Carlo Bellettini11:
Mitigating Accidents in Oil and Gas Production Facilities / Stig Johnsen12:
Security Strategies / Part IV:
Automated Assessment of Compliance with Security Best Practices / Zahid Anwar13:
Collaborative Access Control for Critical Infrastructures / Amine Baina ; Anas Abou El Kalam ; Yves Deswarte ; Mohamed Kaaniche14:
Infrastructure Interdependencies / Part V:
Modeling Dependencies in Critical Infrastructures / Albert Nieuwenhuijs ; Eric Luiijf ; Marieke Klaver15:
Metrics for Quantifying Interdependencies / Emiliano Casalicchio ; Emanuele Galli16:
An Integrated Approach for Simulating Interdependencies / Roberto Setola ; Sandro Bologna ; Vincenzo Masucci17:
Infrastructure Modeling and Simulation / Part VI:
Simulation of Advanced Train Control Systems / Paul Craven ; Paul Oman18:
An Integrated Methodology for Critical Infrastructure Modeling and Simulation / William Tolon ; Seok-Won Lee ; Wei-Ning Xiang ; Joshua Black well ; Cody Yeager ; Andrew Schumpert ; Wray Johnson19:
Using 3D Models and Discrete Simulations in Infrastructure Security Applications / Pierluigi Assogna ; Glauco Bertocchi ; Alberto Paoluzzi ; Michele Vicentino ; Giorgio Scorzelli ; Roberto Zollo20:
Contributing Authors
Preface
Themes and Issues / Part I:
5.

電子ブック

EB
Martin S. Olivier, M. Knauth, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer US, 2006
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Some Challenges in Digital Forensics / Eugene Spafford1:
Evidence Collection and Handling / Part II:
AFF: An Open Extensible Format for Disk Imaging / S. Garfinkel ; D. Malan ; K. Dubec ; C. Stevens ; C. Pham2:
File System Support for Digital Evidence Bags / Golden Richard III ; Vassil Roussev3:
Remote Upload of Evidence Over Mobile Ad Hoc Networks / Indrajit Ray4:
Applying Machine Trust Models to Forensic Investigations / M. Wojcik ; H. Venter ; J. Eloff ; M. Olivier5:
Exploring Big Haystacks: Data Mining and Knowledge Management / Mark Pollitt ; Anthony Whitledge6:
Forensic Techniques / Part III:
Countering Hostile Forensic Techniques / Scott Piper ; Mark Davis ; Sujeet Shenoi7:
Using PLSI-U to Detect Insider Threats From Email Traffic / James Okolica ; Gilbert Peterson ; Robert Mills8:
Collusion Detection Using Multimedia Fingerprints / Anthony Persaud ; Yong Guan9:
Authorship Attribution for Electronic Documents / Patrick Juola10:
Linking Individuals to Digital Information / Shelly Seier ; David Greer ; Gavin Manes11:
Use-Misuse Case Driven Analysis of Positive Train Control / Mark Hartong ; Rajni Goel ; Duminda Wijesekera12:
Operating System and File System Forensics / Part IV:
Mac OS X Forensics / Philip Craiger ; Paul Burke13:
Detecting Data Concealment Programs Using File System Analysis / M. Davis ; R. Kennedy ; K. Pyles ; A. Strickler ; S. Shenoi14:
Assessing Trace Evidence Left by Secure Deletion Programs / 15:
Network Forensics / Part V:
On the Reliability of Network Eavesdropping Tools / Eric Cronin ; Micah Sherr ; Matthew Blaze16:
Active Traffic Capture for Network Forensics / Marco Slaviero ; Anna Granova ; Martin Olivier17:
Logical Traffic Isolation Using Differentiated Services / Tinus Strauss ; Derrick Kourie18:
Passive Detection of NAT Routers and Client Counting / Kenneth Straka19:
Analysis of Web Proxy Logs / B. Fei20:
GSM Cell Site Forensics / Christopher Swenson ; Tyler Moore21:
An Architecture for SCADA Network Forensics / T. Kilpatrick ; J. Gonzalez ; R. Chandia ; M. Papa22:
Portable Electronic Device Forensics / Part VI:
Identifying Digital Cameras Using CFA Interpolation / Sevinc Bayram ; Husrev Sencar ; Nasir Memon23:
Forensic Analysis of BIOS Chips / Pavel Gershteyn24:
Training, Governance and Legal Issues / Part VII:
A Training Tool for Internet Crimes Against Children Cases / S. Aggarwal ; B. Breeden ; P. Henry ; J. Mulholland25:
Process Flow Diagrams for Training and Operations / Jacobus Venter26:
A Control Framework for Digital Forensics / S. von Solms ; C. Louwrens ; C. Reekie ; T. Grobler27:
Criminal Regulation of Anti-Forensic Tools in Japan / Tetsuya Ishii28:
Contributing Authors
Preface
Themes and Issues / Part I:
6.

電子ブック

EB
Gilbert Peterson, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Digital Forensics as a Surreal Narrative / Mark Pollitt1:
Digital Forensic Research: The Good, the Bad and the Unaddressed / Nicole Beebe2:
Towards a Formalization of Digital Forensics / Jill Slay ; Yi-Ghi Lin ; Benjamin Turnbull ; Jason Beckett ; Paul Lin3:
Forensic Techniques / Part II:
Bulk Email Forensics / Fred Cohen4:
Analyzing the Impact of a Virtual Machine on a Host Machine / Greg Dorn ; Chris Marberry ; Scott Conrad ; Philip Craiger5:
Temporal Analysis of Windows MRU Registry Keys / Yuandong Zhu ; Pavel Gladyshev ; Joshua James6:
Using DCT Features for Printing Technique and Copy Detection / Christian Schulze ; Marco Schreyer ; Armin Stahl ; Thomas Breuel7:
Source Camera Identification Using Support Vector Machines / Bo Wang ; Xiangwei Kong ; Xingang You8:
Forensic Analysis of the Sony PlayStation Portable / Carlos Rodriguez9:
Integrity and Privacy / Part III:
Implementing Boot Control for Windows Vista / Yuki Ashino ; Keisuke Fujita ; Maiko Furusawa ; Tetsutaro Uehara ; Ryoichi Sasaki10:
A Forensic Framework for Handling Information Privacy Incidents / Kamil Reddy ; Hein Venter11:
Network Forensics / Part IV:
Tracking Contraband Files Transmitted Using BitTorrent / Karl Schrader ; Barry Mullins ; Gilbert Peterson ; Robert Mills12:
A Model for Foxy Peer-to-Peer Network Investigations / Ricci leong ; Pierre Lai ; Kam-Pui Chow ; Frank Law ; Michael Kwan ; Kenneth Tse13:
Detecting Fraud in Internet Auction Systems / Yanlin Peng ; Linfeng Zhang ; Yong Guan14:
Forensic Computing / Part V:
A Cloud Computing Platform for Large-Scale Forensic Computing / Vassil Roussev ; Ligiang Wang ; Golden Richard ; Lodovico Marziale15:
Password Cracking Using Sony PlayStations / Hugo Kleinhans ; Jonathan Butts ; Sujeet Shenoi16:
Investigative Techniques / Part VI:
A Cost-Effective Model for Digital Forensic Investigations / Richard Overill17:
Analysis of the Digital Evidence Presented in the Yahoo! Case / Hayson Tse18:
Legal Issues / Part VII:
Assessing the Legal Risks in Network Forensic Probing / Michael Losavio ; Olfa Nasraoui ; Vincent Thacker ; Jeff Marean ; Nick Miles ; Roman Yampolskiy ; Ibrahim Imam19:
A Survey of the Legal Issues Facing Digital Forensic Experts / Sydney Liles ; Marcus Rogers ; Marianne Hoebich20:
An Extended Model for E-Discovery Operations / David Billard21:
Evidence Management / Part VIII:
Concept Mapping for Digital Forensic Investigations / April Tanner ; David Dampier22:
System Support for Forensic Inference / Ashish Gehani ; Florent Kirchner ; Natarajan Shankar23:
Contributing Authors
Preface
Themes and Issues / Part I:
7.

電子ブック

EB
Charles Palmer, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Risk Management / Part I:
Information Risk Management and Resilience / Scott Dynes1:
Does the Liberalization of the European Railway Sector Increase Systemic Risk? / Marc Laperrouza2:
Risk-Based Criticality Analysis / Marianthi Theoharidou ; Panayiotis Koizanikolaou ; Dimitris Gritzalis3:
Modeling and Managing Risk in Billing Infrastructures / Fabrizio Baiardi ; Claudio Telmon ; Daniele Sgandurra4:
Control Systems Security / Part II:
A Taxonomy of Attacks on the DNP3 Protocol / Samuel East ; Jonathan Butts ; Mauricio Papa ; Sujeet Shenoi5:
Design and Implementation of a Secure Modbus Protocol / Igor Nai Fovino ; Andrea Carcano ; Marcelo Masera ; Alberto Trombetta6:
Providing Situational Awareness for Pipeline Control Operations / Hugo Kleinhans ; Rodrigo Chandia7:
Enhancing the Safety, Security and Resilience of ICT and SCADA Systems Using Action Research / Stig Johnsen ; Torbjorn Skramstad ; Janne Hagen8:
An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems / Jeffrey Hieb ; James Graham ; Jian Guan9:
Using Physical Models for Anomaly Detection in Control Systems / Nils Svendsen ; Stephen Wolthusen10:
Detecting Anomalies in Process Control Networks / Julian Rrushi ; Kyoung-Don Kang11:
Infrastructure Security / Part III:
Nondeducibility-Based Analysis of Cyber-Physical Systems / Thoshitha Gamage ; Bruce McMillin12:
Stack-Based Buffer Overflows in Harvard Class Embedded Systems / Kristopher Watts ; Paul Oman13:
Secure Cross-Domain Train Scheduling / Mark Hartong ; Rajni Goel ; Duminda Wijesekera14:
Infrastrcture Modeling and Simulation / Part IV:
A Holistic-Reductionistic Approach for Modeling Interdependencies / Stefano De Porcellinis ; Gabriele Oliva ; Stefano Panzieri ; Roberto Setola15:
Ontology-Based Critical Infrastructure Modeling and Simulation / Vincenzo Masucci ; Francesco Adinolfi ; Paolo Servillo ; Giovanni Dipoppa ; Alberto Tofani16:
A Framework for Modeling Interdependencies in Japan's Critical Infrastructures / Zaw Zaw Aung ; Kenji Watanabe17:
Contributing Authors
Preface
Risk Management / Part I:
8.

電子ブック

EB
Mark Pollitt, Sujeet Shenoi
出版情報: Springer eBooks Computer Science , Springer US, 2005
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Dealing with Terabyte Data Sets in Digital Investigations / Nicole Beebe ; Jan Clark1:
Forensics and Privacy-Enhancing Technologies / Martin Olivier2:
A Network-Based Architecture for Storing Digital Evidence / Mark Davis ; Gavin Manes ; Sujeet Shenoi3:
Digital Forensics: Meeting the Challenges of Scientific Evidence / Matthew Meyers ; Marcus Rogers4:
Non-Technical Manipulation of Digital Data / Michael Losavio5:
Investigative Techniques / Part II:
Detecting Social Engineering / Michael Hoeschele6:
A Framework for Email Investigations / Anthony Persaud ; Yong Guan7:
The Mitnick Case: How Bayes Could Have Helped / Thomas Duval ; Bernard Jouga ; Laurent Roger8:
Applying Forensic Principles to Computer-Based Assessment / R. Laubscher ; D. Rabe ; M. Olivier ; J. Eloff ; H. Venter9:
Exploring Forensic Data with Self-Organizing Maps / B. Fei10:
Network Forensics / Part III:
Integrating Digital Forensics in Network Infrastructures / Kulesh Shanmugasundaram ; Herve Bronnimann ; Nasir Memon11:
Using Peer-to-Peer Technology for Network Forensics / Scott Redding12:
Forensic Profiling System / P. Kahai ; M. Srinivasan ; K. Namuduri ; R. Pendse13:
Global Internet Routing Forensics / Eunjong Kim ; Dan Massey ; Indrajit Ray14:
Using Signaling Information in Telecom Network Forensics / T. Moore ; A. Meekan ; G. Manes ; S. Shenoi15:
Portable Electronic Device Forensics / Part IV:
Forensic Analysis of Mobile Phone Internal Memory / Svein Willassen16:
Imaging and Analysis of GSM SIM Cards / Christopher Swenson17:
Extracting Concealed Data from BIOS Chips / P. Gershteyn ; M. Davis18:
Linux and File System Forensics / Part V:
Recovering Digital Evidence from Linux Systems / Philip Craiger19:
Detecting Hidden Data in Ext2/Ext3 File Systems / S. Piper20:
Applications and Techniques / Part VI:
Forensic Analysis of Digital Image Tampering / Gilbert Peterson21:
Content-Based Image Retrieval for Digital Forensics / Y. Chen ; V. Roussev ; G. Richard III ; Y. Gao22:
Making Decisions about Legal Responses to Cyber Attacks / L. Peng ; T. Wingfield ; D. Wijesekera ; E. Frye ; R. Jackson ; J. Michael23:
Applying Filter Clusters to Reduce Search State Space / Jill Slay ; Kris Jorgensen24:
In-Kernel Cryptographic Executable Verification / Yusuf Motara ; Barry Irwin25:
Contributing Authors
Preface
Themes and Issues / Part I:
9.

図書

図書
edited by Ehud Gudes, Sujeet Shenoi
出版情報: Boston : Kluwer Academic, c2003  xvii, 346 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 128
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Role-Based Access Control / I:
Shielding RBAC Infrastructures from Cyberterrorism / A. Belokosztolszki ; D. Eyers1:
Privelege Administration for the Role Graph Model / C. Ionita ; S. Osborn2:
Implementing RBAC Policies / S. Barker, et al.3:
Role Delegation for a Resource-Based Security Model / M. Liebrand, et al.4:
Using X.509 Attribute Certificates for Role-Based EAM / Dongwan Shin, et al.5:
Implementing Workflow Systems / L. Dreyer ; M. Olivier6:
Database Security / II:
Multiphase Damage Confinement System for Databases / Peng Liu ; Ying Wang7:
Analyzing Transaction Logs for Effective Damage Assessment / P. Ragothaman ; B. Panda8:
Deductive Database Security / S. Baker9:
XML Security / III:
Towards Secure XML Federations / Lingyu Wang, et al.10:
Secure XML Views / A. Stoica ; C. Farkas11:
Distributed Cooperative Updates of XML Documents / E. Bertino, et al.12:
Data Mining and Inference / IV:
On Security and Privacy Risks in Association Mining Algorithms / T. Johnsten, et al.13:
Mining Malicious Corruption of Data with Hidden Markov Models / D. Barbara, et al.14:
A Study of Inference Problems in Distributed Databases / LiWu Chang ; I. Moskowitz15:
Multimedia System Security / V:
Uniform Indexing for Geospatial Data and Authorizations / V. Atluri ; P. Mazzoleni16:
Access Control of SVG Documents / E. Damiani, et al.17:
Network Security / VI:
On Modeling Computer Networks for Vulnerability Analysis / C. Campbell, et al.18:
On-Line Intrusion Protection by Detecting Attacks with Diversity / J. Reynolds, et al.19:
Public Key Infrastructure / VII:
Recertification: A Technique to Improve Services in PKI / R. Mukkamala, et al.20:
A Hybrid PKI Model: Application to Secure Mediation / J. Biskup ; Y. Karabulut21:
Formal Methods and Protocols / VIII:
Implementation and Verification of Programmable Security / S. Magill, et al.22:
A Process Algebraic Approach to Security Policies / P. Ryan ; R. Ryvold Arnesen23:
Anonymous and Secure Multicast Subscription / Indrajit Ray ; Indrakshi Ray24:
Security and Privacy / IX:
Privacy and Civil Liberties / D. Chadwick, et al.25:
Contributing Authors
Preface
Role-Based Access Control / I:
10.

図書

図書
edited by Mark Pollitt, Sujeet Shenoi
出版情報: New York, NY : Springer, c2005-  v. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 194, 222, 242
所蔵情報: loading…
目次情報: 続きを見る
Contributing Authors
Preface
Themes and Issues / Part I:
Dealing with Terabyte Data Sets in Digital Investigations / Nicole Beebe ; Jan Clark1:
Forensics and Privacy-Enhancing Technologies / Martin Olivier2:
A Network-Based Architecture for Storing Digital Evidence / Mark Davis ; Gavin Manes ; Sujeet Shenoi3:
Digital Forensics: Meeting the Challenges of Scientific Evidence / Matthew Meyers ; Marcus Rogers4:
Non-Technical Manipulation of Digital Data / Michael Losavio5:
Investigative Techniques / Part II:
Detecting Social Engineering / Michael Hoeschele6:
A Framework for Email Investigations / Anthony Persaud ; Yong Guan7:
The Mitnick Case: How Bayes Could Have Helped / Thomas Duval ; Bernard Jouga ; Laurent Roger8:
Applying Forensic Principles to Computer-Based Assessment / R. Laubscher ; D. Rabe ; M. Olivier ; J. Eloff ; H. Venter9:
Exploring Forensic Data with Self-Organizing Maps / B. Fei10:
Network Forensics / Part III:
Integrating Digital Forensics in Network Infrastructures / Kulesh Shanmugasundaram ; Herve Bronnimann ; Nasir Memon11:
Using Peer-to-Peer Technology for Network Forensics / Scott Redding12:
Forensic Profiling System / P. Kahai ; M. Srinivasan ; K. Namuduri ; R. Pendse13:
Global Internet Routing Forensics / Eunjong Kim ; Dan Massey ; Indrajit Ray14:
Using Signaling Information in Telecom Network Forensics / T. Moore ; A. Meekan ; G. Manes ; S. Shenoi15:
Portable Electronic Device Forensics / Part IV:
Forensic Analysis of Mobile Phone Internal Memory / Svein Willassen16:
Imaging and Analysis of GSM SIM Cards / Christopher Swenson17:
Extracting Concealed Data from BIOS Chips / P. Gershteyn ; M. Davis18:
Linux and File System Forensics / Part V:
Recovering Digital Evidence from Linux Systems / Philip Craiger19:
Detecting Hidden Data in Ext2/Ext3 File Systems / S. Piper20:
Applications and Techniques / Part VI:
Forensic Analysis of Digital Image Tampering / Gilbert Peterson21:
Content-Based Image Retrieval for Digital Forensics / Y. Chen ; V. Roussev ; G. Richard III ; Y. Gao22:
Making Decisions about Legal Responses to Cyber Attacks / L. Peng ; T. Wingfield ; D. Wijesekera ; E. Frye ; R. Jackson ; J. Michael23:
Applying Filter Clusters to Reduce Search State Space / Jill Slay ; Kris Jorgensen24:
In-Kernel Cryptographic Executable Verification / Yusuf Motara ; Barry Irwin25:
Some Challenges in Digital Forensics / Eugene Spafford
Evidence Collection and Handling
AFF: An Open Extensible Format for Disk Imaging / S. Garfinkel ; D. Malan ; K. Dubec ; C. Stevens ; C. Pham
File System Support for Digital Evidence Bags / Golden Richard III ; Vassil Roussev
Remote Upload of Evidence Over Mobile Ad Hoc Networks
Applying Machine Trust Models to Forensic Investigations / M. Wojcik
Exploring Big Haystacks: Data Mining and Knowledge Management / Mark Pollitt ; Anthony Whitledge
Forensic Techniques
Countering Hostile Forensic Techniques / Scott Piper
Using PLSI-U to Detect Insider Threats From Email Traffic / James Okolica ; Robert Mills
Collusion Detection Using Multimedia Fingerprints
Authorship Attribution for Electronic Documents / Patrick Juola
Linking Individuals to Digital Information / Shelly Seier ; David Greer
Use-Misuse Case Driven Analysis of Positive Train Control / Mark Hartong ; Rajni Goel ; Duminda Wijesekera
Operating System and File System Forensics
Mac OS X Forensics / Paul Burke
Detecting Data Concealment Programs Using File System Analysis / R. Kennedy ; K. Pyles ; A. Strickler
Assessing Trace Evidence Left by Secure Deletion Programs
On the Reliability of Network Eavesdropping Tools / Eric Cronin ; Micah Sherr ; Matthew Blaze
Active Traffic Capture for Network Forensics / Marco Slaviero ; Anna Granova
Logical Traffic Isolation Using Differentiated Services / Tinus Strauss ; Derrick Kourie
Passive Detection of NAT Routers and Client Counting / Kenneth Straka
Analysis of Web Proxy Logs
GSM Cell Site Forensics / Tyler Moore
An Architecture for SCADA Network Forensics / T. Kilpatrick ; J. Gonzalez ; R. Chandia ; M. Papa
Identifying Digital Cameras Using CFA Interpolation / Sevinc Bayram ; Husrev Sencar
Forensic Analysis of BIOS Chips / Pavel Gershteyn
Training, Governance and Legal Issues / Part VII:
A Training Tool for Internet Crimes Against Children Cases / S. Aggarwal ; B. Breeden ; P. Henry ; J. Mulholland
Process Flow Diagrams for Training and Operations / Jacobus Venter26:
A Control Framework for Digital Forensics / S. von Solms ; C. Louwrens ; C. Reekie ; T. Grobler27:
Criminal Regulation of Anti-Forensic Tools in Japan / Tetsuya Ishii28:
Contributing Authors
Preface
Themes and Issues / Part I:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼