in network forensics log analysis techniques using clustering · sophisticated digital forensics,...
TRANSCRIPT
Log Analysis Techniques using Clusteringin Network Forensics
By Imam Riadi
WORD COUNT 5105 TIME SUBMITTED 18-JUL-2017 09:41AM
PAPER ID 30571450
3%SIMILARITY INDEX
1
2
3
4
5
6
7
8
EXCLUDE QUOTES OFF
EXCLUDE BIBLIOGRAPHY OFF
EXCLUDE MATCHES OFF
Log Analysis Techniques using Clustering in NetworkForensicsORIGINALITY REPORT
PRIMARY SOURCES
issuu.comInternet
akademik.unsoed.ac.idInternet
interscience.inInternet
Zhu, Ying. "Attack Pattern Discovery in ForensicInvestigation of Network Attacks", IEEE Journal onSelected Areas in Communications, 2011.Crossref
www.forensicmag.comInternet
www.computersecuritydirectory.comInternet
www.dronasoft.comInternet
www.sersc.orgInternet
40 words — 1%
24 words — < 1%
21 words — < 1%
21 words — < 1%
10 words — < 1%
10 words — < 1%
10 words — < 1%
9 words — < 1%