-
Tools support esp. steg tools, home grown tools, and anti-forensic tools
-
Reverse engineering of malware
-
Vulnerability Assessments on client network
-
Network security support for Cisco intrusion detection systems
-
COTS integration support to detect viruses and provide protection
-
Research artifacts left by internet communication
|
|
|