关注
Steve Romig
标题
引用次数
引用次数
年份
Handbook of computer crime investigation: forensic tools and technology
E Casey
Elsevier, 2001
2682001
The {OSU} Flow-tools Package and {CISCO}{NetFlow} Logs
M Fullmer, S Romig
14th Systems Administration Conference (LISA 2000), 2000
1562000
On human mobility predictability via WLAN logs
PY Cao, G Li, AC Champion, D Xuan, S Romig, W Zhao
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
262017
Backup at ohio state, take 2
SM Romig
Proceedings of the Fourth Large Installation System Administrator’s …, 1990
111990
correlating log file entries
S Romig
; login:, 25 (7), 38-44, 2000
62000
Cloning customized hosts (or customizing cloned hosts)
GM Jones, SM Romig
Proceedings of the Fifth Large Installation Systems Administration …, 1991
61991
Incident response tools'
S Romig
Handbook of Computer Crime Investigation: Forensic Tools and Technology, 73-92, 2002
42002
Computer intrusions e time-related issues
R Steve
Handbook of computer crime investigation. London: Academic Press, 2002
32002
IRC on your dime? What you really need to know about Internet relay chat
J ERayome
Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States), 1998
31998
Forensic Computer Investigations
S Romig
22010
Correlating log file entries.; login
S Romig
November, 2000
22000
Cisco flow logs and intrusion detection at the Ohio State University
S Romig, M Fullmer, S Ramachandran
Login:-The Magazine of the USENIX Association, 1999
21999
Cisco Flow Logs and Intrusion Detection at the Ohio State university. login; magazine
S Romig, S Ramachandran
September, 1999
21999
Some Useful Changes for Boot RC Files
SM Romig
Proceedings of the Large Installation Systems Administration Conference, 1991
21991
Malware
S Romig
2006
Computer Intrusions From Handbook of Computer Crime Investigation: Forensic Tools and Technology, P 395-413, 2002, Eoghan Casey, ed,--See NCJ-195111
S Romig
http://www. academicpress. com, 2002
2002
ACPO 2, 7 Albitz, P. 212 Balestra, M. 378, 380, 382 Blank-Edelman, D. 240 Bronstein, Daniel A. 19n
B Brucker, C Bryson, C Bullard, M Bunker, A Cabot, H Carvey, E Casey, ...
Handbook of Computer Crime Investigation: Forensic Tools and Technology, 437, 2001
2001
COMPUTER INTRUSIONS
S Romig
Handbook of Computer Crime Investigation: Forensic Tools and Technology, 395, 2001
2001
Experiences with Incident Response at The Ohio State University.
S Romig
LISA, 2000
2000
Review {a Tool For Reviewing Tcpdump Packet Logs
SM Romig
1997
系统目前无法执行此操作,请稍后再试。
文章 1–20