Author:Dlamini, I; Olivier, M; Sibiya, SDate:Aug 2009Network forensics involves capturing, recording and analysing network activity in discovering the source of security policy violations or information assurance. The network forensic system that is described in this paper is called the ...Read more
Author:Dlamini, I; Olivier, M; Sibiya, SDate:Aug 2009The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logical Traffic Isolation (LTI) based on Differentiated Services ...Read more