@dblp

Highly efficient techniques for network forensics.

, , , and . ACM Conference on Computer and Communications Security, page 150-160. ACM, (2007)

Links and resources

Tags