Crosby-Signed Thesis - Alliance Digital Repository
Crosby-Signed Thesis - Alliance Digital Repository
Crosby-Signed Thesis - Alliance Digital Repository
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
IMPACT OF IPV6 TRANSITION MECHANISMS ON THE NETWORK FORENSIC<br />
138<br />
Fisk, G. (2002, Oct). Eliminating Steganography in Internet Traffic with Active Wardens. Paper<br />
presented at the 5th International Workshop on Information Hiding.<br />
Fraud Examiners Manual. (2008). Association of Certified Fraud Examiners.<br />
FreeBSD. (n.d.). Retrieved Feb 9, 2011, from http://freebsd.org<br />
Friacas, C..Baptista, M..Domingues, M., & Ferreira, P. (2006). 6TO4 versus<br />
TUNNELBROKERS. Paper presented at the Proceedings of the International Multi-<br />
Conference on Computing in the Global Information Technology (ICCGI'06). Retrieved<br />
from http://doi.ieeecomputersociety.org/10.1109/ICCGI.2006.1<br />
Giffin, J. (2002, Apr). Covert Messaging Through TCP Timestamps. Paper presented at the<br />
Privacy Enhancing Technologies Workshop (PET).<br />
Gil, T. M. (2005). IP-over-DNS using NSTX, from http://thomer.com/howtos/nstx/<br />
Gilligan, R., & Nordmark, E. (2000). Transition mechanisms for IPv6 hosts and routers. RFC<br />
2893: Internet Engineering Task Force (IETF).<br />
Girling, C. G. (1987, Feb). Covert Channels in LAN’s. IEEE Transactions in Software<br />
Engineering, SE-13(2), 292-296.<br />
gogoCLIENT. (n.d.). Retrieved Feb 9, 2011, from<br />
http://gogonet.gogo6.com/profile/gogoCLIENT<br />
GosevaPopstojanova, K..Miller, B..Pantev, R., & Dimitrijevikj, A. (2010). Empirical Analysis of<br />
Attackers Activity on Multi-tier Web Systems. Paper presented at the 24th IEEE<br />
International Conference on Advanced Information Networking and Applications.<br />
Retrieved from http://doi.ieeecomputersociety.org/10.1109/AINA.2010.138<br />
doi:10.1109/AINA.2010.138