Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability

B Singh, U Singh - Computers & Security, 2018 - Elsevier
Nowadays, perpetrators of the crimes are more forensic-aware than ever and take
preventive measures to limit or delete the program execution artifacts. Also, analysts are …

Ubuntu One investigation: Detecting evidences on client machines

M Shariati, A Dehghantanha, B Martini… - arXiv preprint arXiv …, 2018 - arxiv.org
STorage as a Service (STaaS) cloud services has been adopted by both individuals and
businesses as a dominant technology worldwide. Similar to other technologies, this widely …

Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis

I Ahmad, H Abbas, A Raza, KKR Choo… - Australian Journal of …, 2018 - Taylor & Francis
The constant evolution of virtualisation technologies and the availability of anti-forensic
techniques and tools complicate efforts by forensic investigators to investigate a crime or a …

Analysis and improvements of behaviour-based malware detection mechanisms

NM Alruhaily - 2018 - etheses.bham.ac.uk
The massive growth of computer usage has led to an increase in the related security
concerns. Malware, such as Viruses, Worms, and Trojans, have become a major issue due …

Background and Literature Review

D Quick, KKR Choo, D Quick, KKR Choo - Big Digital Forensic Data …, 2018 - Springer
Background and Literature Review | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …