A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining

N Nissim, Y Lapidot, A Cohen, Y Elovici - Knowledge-Based Systems, 2018 - Elsevier
Most organizations today employ cloud-computing environments and virtualization
technology; Due to their prevalence and importance in providing services to the entire …

A method for malware detection in virtualization environment

D Tank, A Aggarwal, N Chaubey - … , COMS2 2020, Gujarat, India, March 26 …, 2020 - Springer
Abstract Security of Virtual Machines (VMs) is a major concern with the virtualization
environment. Virtual machines are a primary target for an adversary to acquire unethical …

Digital forensic of a cloud based snapshot

S Almulla, Y Iraqi, A Jones - 2016 Sixth International …, 2016 - ieeexplore.ieee.org
Researchers in the field of cloud forensics need to move away from insisting on acquiring all
data as has historically been the case in computer forensics-and yet still be able to prove the …

[PDF][PDF] Live Memory Forensics Investigations: A Comparative Analysis

I Syamsuddin, D Syamsuar - Journal of Advances in …, 2023 - pdfs.semanticscholar.org
The escalating dependence on information technology for daily activities ensures that
cybercrime cases continue unabated. Consequently, the role of cyber forensics investigators …

[PDF][PDF] Feasibility of digital forensic examination and analysis of a cloud based storage snapshot

S Almulla, Y Iraqi, A Jones - Journal of Digital Information Management, 2017 - dline.info
With the increasing use of digital technologies and the subsequent escalation in crimes that
involve these technologies, the role of digital forensics has become increasingly more …

[PDF][PDF] Audit Compliance and Forensics Frameworks for Improved Critical Infrastructure Protection

JPM Henriques - 2023 - estudogeral.uc.pt
Modern societies are increasingly dependent on essential products and services provided
by Critical Infrastructures (CI), many of them consisting of Industrial Automation and Control …

[PDF][PDF] A Method for Malware Analysis by Virtual Machine Introspection Technique.

LEHA García, RA Bermejo - Res. Comput. Sci., 2018 - rcs.cic.ipn.mx
Malicious code has become one of the biggest threats in the field of computer security.
Traditional malware monitoring tools are installed in the physical host, they trust in the …

[PDF][PDF] Declaración Jurada

JP Benedetti - bibliotecadigital.econ.uba.ar
El presente trabajo investiga la información relacionada con la virtualización, en particular
con las máquinas virtuales. El foco está puesto en los temas relacionados con seguridad …

PurgeMEM: Towards Building A Memory Safe Cloud

Y Karim, K Satvat, M Hosseini, R Hasan - 2019 SoutheastCon, 2019 - ieeexplore.ieee.org
Cloud computing has become the industry standard for rapid application deployment,
scalable server support, and mobile and distributed services. It provides seamless scalability …