In‐Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes
RJ McDown, C Varol, L Carvajal… - Journal of forensic …, 2016 - Wiley Online Library
The comparison studies on random access memory (RAM) acquisition tools are either
limited in metrics or the selected tools were designed to be executed in older operating …
limited in metrics or the selected tools were designed to be executed in older operating …
Steganographic techniques on social media: Investigation guidelines
A Chee - 2013 - openrepository.aut.ac.nz
Online social networking is available to anyone who wants to sign up to the many sites
available. The web-based services allow users to communicate with many media sources …
available. The web-based services allow users to communicate with many media sources …
A detailed study on Security breaches of Digital Forensics in Cyber Physical Systems
F Khan - 2019 Sixth HCT Information Technology Trends (ITT), 2019 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) tries to combine the advanced application of embedded
computer and communication technologies with large groups of physical domains such as …
computer and communication technologies with large groups of physical domains such as …
[图书][B] Forensic readiness capability for cloud computing
L De Marco - 2015 - search.proquest.com
Cloud computing services represent the actual computation delivery to the most of customer
communities. Such services are regulated by a contract called Service Level Agreement …
communities. Such services are regulated by a contract called Service Level Agreement …
Una arquitectura distribuida para la detección, comunicación y mitigación de la denegación de servicio
L Campo Giralte - 2014 - burjcdigital.urjc.es
Como bien se sabe, en la actualidad los ciberataques tienen lugar en cualquier lugar del
mundo y afectan a todo tipo de infraestructuras. Todos los meses se reciben noticias de …
mundo y afectan a todo tipo de infraestructuras. Todos los meses se reciben noticias de …
[PDF][PDF] Critical Phases in Network Forensics-A Review
The fragility nature of digital evidence required an adequate investigation procedure to
maintain its admissibility. Thus, a Digital Forensic Investigation (DFI) models and …
maintain its admissibility. Thus, a Digital Forensic Investigation (DFI) models and …
Assessing the availability of forensic evidence from social networking sites: tool capability
S Alshaifi - 2016 - openrepository.aut.ac.nz
The evolution and popularity of Online Social Networking Sites (OSNSs) has produced a
new platform for communications and collaborations. Features provided by OSNSs allow …
new platform for communications and collaborations. Features provided by OSNSs allow …