Digital Profiling: A Computer Forensics Approach, ARES, vol.2011, pp.330-364, 2011. ,
DOI : 10.1007/978-3-642-23300-5_26
Digital scene of crime: technique of profiling users, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2012. ,
Computer Forensics e Indagini Digitali " , Manuale tecnico-giuridico e casi pratici, Experta srl, 2011. ,
The Tao of network security monitoring, 2005. ,
Network intrusion detection, IEEE Network, vol.8, issue.3, pp.26-41, 1994. ,
DOI : 10.1109/65.283931
Intrusion Detection Systems. National Institute of Standards and Technology Special Publication on IDS, 2001. ,
How to guide: implementing a network based intrusion detection system, 2001. ,
Snort -Lightweight Intrusion Detection System for Networks, 13th System Administration Conference -LISA '99, 1999. ,
Network anomaly detection through nonlinear analysis, Computers & Security, vol.29, issue.7, pp.737-755, 2010. ,
A building block approach to Intrusion Detection, RAID, 2001. ,
The application of Intrusion Detection Systems in a Forensic Environment . Recent Advances in Intrusion Detection -Raid, 2001. ,
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies, Computers & Security, vol.27, issue.12, pp.48-62, 2008. ,
An intelligent security architecture for distributed firewalling environments, Journal of Ambient Intelligence and Humanized Computing, vol.29, issue.7, pp.1-12, 2011. ,
DOI : 10.1007/s12652-011-0069-8
Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system, Int. J. Wire. Mob. Compututer, vol.2, issue.1, pp.47-58, 2007. ,
Tecnologia database per l'analisi di log file di Web Server. Universita' degli Studi di Modena e Reggio Emilia, 2005. ,