Handbook of computer crime investigation: forensic tools and technology E Casey Elsevier, 2001 | 270 | 2001 |
The {OSU} Flow-tools Package and {CISCO}{NetFlow} Logs M Fullmer, S Romig 14th Systems Administration Conference (LISA 2000), 2000 | 157 | 2000 |
On human mobility predictability via WLAN logs PY Cao, G Li, AC Champion, D Xuan, S Romig, W Zhao IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 27 | 2017 |
Backup at ohio state, take 2 SM Romig Proceedings of the Fourth Large Installation System Administrator’s …, 1990 | 11 | 1990 |
correlating log file entries S Romig ; login:, 25 (7), 38-44, 2000 | 6 | 2000 |
Cloning customized hosts (or customizing cloned hosts) GM Jones, SM Romig Proceedings of the Fifth Large Installation Systems Administration …, 1991 | 6 | 1991 |
Incident response tools' S Romig Handbook of Computer Crime Investigation: Forensic Tools and Technology, 73-92, 2002 | 4 | 2002 |
Computer intrusions e time-related issues R Steve Handbook of computer crime investigation. London: Academic Press, 2002 | 3 | 2002 |
IRC on your dime? What you really need to know about Internet relay chat J ERayome Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States), 1998 | 3 | 1998 |
Forensic Computer Investigations S Romig | 2 | 2010 |
Correlating log file entries.; login S Romig November, 2000 | 2 | 2000 |
Cisco flow logs and intrusion detection at the Ohio State University S Romig, M Fullmer, S Ramachandran Login:-The Magazine of the USENIX Association, 1999 | 2 | 1999 |
Cisco Flow Logs and Intrusion Detection at the Ohio State university. login; magazine S Romig, S Ramachandran September, 1999 | 2 | 1999 |
Some Useful Changes for Boot RC Files SM Romig Proceedings of the Large Installation Systems Administration Conference, 1991 | 2 | 1991 |
Malware S Romig | | 2006 |
Computer Intrusions From Handbook of Computer Crime Investigation: Forensic Tools and Technology, P 395-413, 2002, Eoghan Casey, ed,--See NCJ-195111 S Romig http://www. academicpress. com, 2002 | | 2002 |
ACPO 2, 7 Albitz, P. 212 Balestra, M. 378, 380, 382 Blank-Edelman, D. 240 Bronstein, Daniel A. 19n B Brucker, C Bryson, C Bullard, M Bunker, A Cabot, H Carvey, E Casey, ... Handbook of Computer Crime Investigation: Forensic Tools and Technology, 437, 2001 | | 2001 |
COMPUTER INTRUSIONS S Romig Handbook of Computer Crime Investigation: Forensic Tools and Technology, 395, 2001 | | 2001 |
Experiences with Incident Response at The Ohio State University. S Romig LISA, 2000 | | 2000 |
Review {a Tool For Reviewing Tcpdump Packet Logs SM Romig | | 1997 |