ANNUL 发表于 2025-4-1 05:22:37

http://reply.papertrans.cn/28/2794/279322/279322_61.png

最高峰 发表于 2025-4-1 08:32:43

,Gotta Catch’em All! Improving P2P Network Crawling Strategies,dependant on the crawlers’ speed as the network can be described as a moving target. In this paper, we present improvements based on the example of a newly developed Bitcoin crawler that can be utilised to reduce resource usage/requirements of crawlers and therefore speed up capturing network snapsh

闪光你我 发表于 2025-4-1 11:28:29

,Quantifying Paging on Recoverable Data from Windows User-Space Modules,mic library, or driver) that was loaded as part of the kernel or a user-mode process. We show that this ratio is particularly low in shared dynamic library modules, as opposed to executable modules. We also discuss the issues of memory forensics that can affect scanning for malicious evidences in pa
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Digital Forensics and Cyber Crime; 12th EAI Internation Pavel Gladyshev,Sanjay Goel,Daryl Johnson Conference proceedings 2022 ICST Institut