Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network te...
With the pervasiveness of computers and mobile devices, digital forensics becomes more important in ...
Komunikace předávaná skrze Internet zahrnuje komunikaci mezi pachateli těžké trestné činnosti. Státn...
Abstract—This paper reflects on the network forensic impli-cation of a specific clean-slate future i...
Communicating parties inside computer networks use different kind of identifiers. Some of these iden...
V této práci se seznámíme s návrhem a implementací rozšíření části systému pro zákonné odposlechy. S...
In the current Internet the Internet Protocol address is burdened with two roles. It serves as the i...
Identification in electronic networks (e-Identification) has been a source of new risks in e-commerc...
The Internet has become important since information is now stored in digital form and is transported...
IP is often seen as the “lingua franca” of modern communication. It provides interoperability across...
Privacy-preserving forensic attribution is a new ar-chitectural primitive we propose that allows ind...
The possibility for theft or misuse of legitimate user credentials is a potential cyber-security wea...
© 2017 The Author(s) The prevalence of the Internet and cloud-based applications, alongside the tech...
This work deals with detection of users within computer networks on different layers of the TCP/IP a...
Two trends are present in both the private and public domain: increasing interorganisational co-oper...
Two trends are present in both the private and public domain: increasing interorganisational co-oper...
With the pervasiveness of computers and mobile devices, digital forensics becomes more important in ...
Komunikace předávaná skrze Internet zahrnuje komunikaci mezi pachateli těžké trestné činnosti. Státn...
Abstract—This paper reflects on the network forensic impli-cation of a specific clean-slate future i...
Communicating parties inside computer networks use different kind of identifiers. Some of these iden...
V této práci se seznámíme s návrhem a implementací rozšíření části systému pro zákonné odposlechy. S...
In the current Internet the Internet Protocol address is burdened with two roles. It serves as the i...
Identification in electronic networks (e-Identification) has been a source of new risks in e-commerc...
The Internet has become important since information is now stored in digital form and is transported...
IP is often seen as the “lingua franca” of modern communication. It provides interoperability across...
Privacy-preserving forensic attribution is a new ar-chitectural primitive we propose that allows ind...
The possibility for theft or misuse of legitimate user credentials is a potential cyber-security wea...
© 2017 The Author(s) The prevalence of the Internet and cloud-based applications, alongside the tech...
This work deals with detection of users within computer networks on different layers of the TCP/IP a...
Two trends are present in both the private and public domain: increasing interorganisational co-oper...
Two trends are present in both the private and public domain: increasing interorganisational co-oper...
With the pervasiveness of computers and mobile devices, digital forensics becomes more important in ...
Komunikace předávaná skrze Internet zahrnuje komunikaci mezi pachateli těžké trestné činnosti. Státn...
Abstract—This paper reflects on the network forensic impli-cation of a specific clean-slate future i...