Network forensics: Methodical literature review

G Shrivastava - … 3rd International Conference on Computing for …, 2016 - ieeexplore.ieee.org
Nowadays network grow explosively and crime related to the network is increasing. Network
Forensics is a sub-division of digital forensics and it mainly focus on the analysis of network …

Studi Komparasi Investigasi Digital Forensik pada Tindak Kriminal

MN Faiz - Journal of Informatics Information System …, 2018 - journal.ittelkom-pwt.ac.id
Investigasi digital forensik telah mengalami perubahan luar biasa dalam dekade akhir ini.
Dari komputer awal hingga perangkat seluler saat ini dan perangkat penyimpanan. Digital …

Steganography and its technique: Technical overview

G Shrivastava, A Pandey, K Sharma - Proceedings of the Third …, 2013 - Springer
This paper is basically overview on the steganography. In this paper, we mainly present
current, past and future work done in the field of steganography. Here we give a brief …

[PDF][PDF] JURNAL RESTI

IR Sunardi, MH Akbar - Jurnal RESTI (Rekayasa Sistem dan …, 2020 - researchgate.net
Steganography is one of the anti-forensic techniques that allow criminals to hide information
in other messages so that during the investigation, the investigator will experience problems …

Automated malware identification method using image descriptors and singular value decomposition

T Tuncer, F Ertam, S Dogan - Multimedia Tools and Applications, 2021 - Springer
Cyber-attacks have become a significant problem worldwide. Therefore, many methods,
networks, and applications have been suggested for providing information security in the …

Designing and evaluating an automatic forensic model for fast response of cross-border e-commerce security incidents

CM Chen, ZX Cai, DWM Wen - Journal of Global Information …, 2021 - igi-global.com
The rapid development of cross-border e-commerce over the past decade has accelerated
the integration of the global economy. At the same time, cross-border e-commerce has …

[PDF][PDF] Comparative analysis of digital forensic models

F Jafari, RS Satti - Journal of Advances in Computer Networks, 2015 - academia.edu
Digital forensic is the study of scientifically proven methods that results in the identification,
preservation, collection, validation, analysis, interpretation, documentation and presentation …

Approaches of network forensic model for investigation

G Shrivastava - International Journal of Forensic …, 2017 - inderscienceonline.com
Universally, the security and forensic workforce keeps up tab through newest technology of
attack tools and modus operandi adopted by attackers. There is a plethora of free tools …

[PDF][PDF] Analysis of digital forensic investigation models

SS Mir, U Shoaib, MS Sarfraz - Int. J. Comput. Sci. Inform. Secur, 2016 - academia.edu
Digital Forensic investigation is an emerging technology, which is originated from the
frequent use of computers and digital storage devices by criminals. All the organizations are …

Network forensics: Today and tomorrow

G Shrivastava, K Sharma… - 2016 3rd International …, 2016 - ieeexplore.ieee.org
Whenever Intrusion is detected over the internet a network forensic is used to capture,
record all the evidence, maintain documentation, and lastly perform analysis. It collects all …