Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability
B Singh, U Singh - Computers & Security, 2018 - Elsevier
Nowadays, perpetrators of the crimes are more forensic-aware than ever and take
preventive measures to limit or delete the program execution artifacts. Also, analysts are …
preventive measures to limit or delete the program execution artifacts. Also, analysts are …
Ubuntu One investigation: Detecting evidences on client machines
M Shariati, A Dehghantanha, B Martini… - arXiv preprint arXiv …, 2018 - arxiv.org
STorage as a Service (STaaS) cloud services has been adopted by both individuals and
businesses as a dominant technology worldwide. Similar to other technologies, this widely …
businesses as a dominant technology worldwide. Similar to other technologies, this widely …
Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis
The constant evolution of virtualisation technologies and the availability of anti-forensic
techniques and tools complicate efforts by forensic investigators to investigate a crime or a …
techniques and tools complicate efforts by forensic investigators to investigate a crime or a …
Analysis and improvements of behaviour-based malware detection mechanisms
NM Alruhaily - 2018 - etheses.bham.ac.uk
The massive growth of computer usage has led to an increase in the related security
concerns. Malware, such as Viruses, Worms, and Trojans, have become a major issue due …
concerns. Malware, such as Viruses, Worms, and Trojans, have become a major issue due …
Background and Literature Review
D Quick, KKR Choo, D Quick, KKR Choo - Big Digital Forensic Data …, 2018 - Springer
Background and Literature Review | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …