A survey on forensics and compliance auditing for critical infrastructure protection
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …
Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining
Most organizations today employ cloud-computing environments and virtualization
technology; Due to their prevalence and importance in providing services to the entire …
technology; Due to their prevalence and importance in providing services to the entire …
A method for malware detection in virtualization environment
D Tank, A Aggarwal, N Chaubey - … , COMS2 2020, Gujarat, India, March 26 …, 2020 - Springer
Abstract Security of Virtual Machines (VMs) is a major concern with the virtualization
environment. Virtual machines are a primary target for an adversary to acquire unethical …
environment. Virtual machines are a primary target for an adversary to acquire unethical …
Digital forensic of a cloud based snapshot
Researchers in the field of cloud forensics need to move away from insisting on acquiring all
data as has historically been the case in computer forensics-and yet still be able to prove the …
data as has historically been the case in computer forensics-and yet still be able to prove the …
[PDF][PDF] Live Memory Forensics Investigations: A Comparative Analysis
I Syamsuddin, D Syamsuar - Journal of Advances in …, 2023 - pdfs.semanticscholar.org
The escalating dependence on information technology for daily activities ensures that
cybercrime cases continue unabated. Consequently, the role of cyber forensics investigators …
cybercrime cases continue unabated. Consequently, the role of cyber forensics investigators …
[PDF][PDF] Feasibility of digital forensic examination and analysis of a cloud based storage snapshot
With the increasing use of digital technologies and the subsequent escalation in crimes that
involve these technologies, the role of digital forensics has become increasingly more …
involve these technologies, the role of digital forensics has become increasingly more …
[PDF][PDF] Audit Compliance and Forensics Frameworks for Improved Critical Infrastructure Protection
JPM Henriques - 2023 - estudogeral.uc.pt
Modern societies are increasingly dependent on essential products and services provided
by Critical Infrastructures (CI), many of them consisting of Industrial Automation and Control …
by Critical Infrastructures (CI), many of them consisting of Industrial Automation and Control …
[PDF][PDF] A Method for Malware Analysis by Virtual Machine Introspection Technique.
LEHA García, RA Bermejo - Res. Comput. Sci., 2018 - rcs.cic.ipn.mx
Malicious code has become one of the biggest threats in the field of computer security.
Traditional malware monitoring tools are installed in the physical host, they trust in the …
Traditional malware monitoring tools are installed in the physical host, they trust in the …
[PDF][PDF] Declaración Jurada
JP Benedetti - bibliotecadigital.econ.uba.ar
El presente trabajo investiga la información relacionada con la virtualización, en particular
con las máquinas virtuales. El foco está puesto en los temas relacionados con seguridad …
con las máquinas virtuales. El foco está puesto en los temas relacionados con seguridad …
PurgeMEM: Towards Building A Memory Safe Cloud
Cloud computing has become the industry standard for rapid application deployment,
scalable server support, and mobile and distributed services. It provides seamless scalability …
scalable server support, and mobile and distributed services. It provides seamless scalability …