標題: Titlebook: Digital Forensics and Cyber Crime; 10th International E Frank Breitinger,Ibrahim‘Baggili Conference proceedings 2019 ICST Institute for Com [打印本頁] 作者: Consonant 時間: 2025-3-21 19:56
書目名稱Digital Forensics and Cyber Crime影響因子(影響力)
書目名稱Digital Forensics and Cyber Crime影響因子(影響力)學科排名
書目名稱Digital Forensics and Cyber Crime網(wǎng)絡公開度
書目名稱Digital Forensics and Cyber Crime網(wǎng)絡公開度學科排名
書目名稱Digital Forensics and Cyber Crime被引頻次
書目名稱Digital Forensics and Cyber Crime被引頻次學科排名
書目名稱Digital Forensics and Cyber Crime年度引用
書目名稱Digital Forensics and Cyber Crime年度引用學科排名
書目名稱Digital Forensics and Cyber Crime讀者反饋
書目名稱Digital Forensics and Cyber Crime讀者反饋學科排名
作者: Constant 時間: 2025-3-21 23:38 作者: 使饑餓 時間: 2025-3-22 02:43
Digital Forensics Event Graph Reconstructionevent correlation system that utilizes a native graph database to store event data. This storage method leverages zero index traversals. PGER reduces the processing time of event correlation grammars by up?to a factor of 9.9 times over a system that uses a relational database based approach.作者: 迷住 時間: 2025-3-22 06:31
https://doi.org/10.1007/978-94-007-5497-3sts of a popular item). We demonstrate the security and effectiveness of the proposed scheme in resisting offline guessing attacks, and in particular using simulations to show that schemes based on multi-item passphrases achieve higher security and better usability than those using passwords and diceware passphrases.作者: multiply 時間: 2025-3-22 11:50 作者: Diverticulitis 時間: 2025-3-22 14:40
Claudio Gallicchio,Alessio Micheli did not require root access to retrieve the data. We were also able to implement a proof-of-concept trojan which exemplifies how a malicious actor may exploit the lack of security in these applications and exfiltrate user data and cryptocurrency.作者: Diverticulitis 時間: 2025-3-22 20:52 作者: 語源學 時間: 2025-3-23 00:51 作者: ungainly 時間: 2025-3-23 05:28
Mesocosm Study in the Reservoir Ecosystemverification that is a verification procedure for digital evidence sufficiency for court decision using these crime features. This model has been developed based on analysis of five industrial espionage cases and the literature review, being validated with three additional cases in terms of the effectiveness of the model.作者: Systemic 時間: 2025-3-23 07:40
Mihir K. Sinha Ph.D.,Larry R. Padgett Ph.D.nce as to what precisely is happening in the background of SSDs during their operation and investigation and also study forensic methods to extract artefacts from SSD under different conditions in terms of volume of data, powered effect, etc. In addition, we evaluate our approach with several experiments across various use-case scenarios.作者: 成份 時間: 2025-3-23 13:43
If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept did not require root access to retrieve the data. We were also able to implement a proof-of-concept trojan which exemplifies how a malicious actor may exploit the lack of security in these applications and exfiltrate user data and cryptocurrency.作者: 社團 時間: 2025-3-23 14:06 作者: 小卒 時間: 2025-3-23 18:26 作者: Processes 時間: 2025-3-23 23:22 作者: MUTED 時間: 2025-3-24 06:02
Solid State Drive Forensics: Where Do We Stand?nce as to what precisely is happening in the background of SSDs during their operation and investigation and also study forensic methods to extract artefacts from SSD under different conditions in terms of volume of data, powered effect, etc. In addition, we evaluate our approach with several experiments across various use-case scenarios.作者: ULCER 時間: 2025-3-24 07:58 作者: synovial-joint 時間: 2025-3-24 14:44
Mihir K. Sinha Ph.D.,Larry R. Padgett Ph.D.event correlation system that utilizes a native graph database to store event data. This storage method leverages zero index traversals. PGER reduces the processing time of event correlation grammars by up?to a factor of 9.9 times over a system that uses a relational database based approach.作者: Hyperlipidemia 時間: 2025-3-24 15:24
https://doi.org/10.1007/978-3-030-05487-8android,; artifact correlation,; artificial intelligence; carving,; computer crime; computer crime,; cyber作者: anaphylaxis 時間: 2025-3-24 21:20
978-3-030-05486-1ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019作者: 抗原 時間: 2025-3-25 02:21
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/d/image/279319.jpg作者: FLINT 時間: 2025-3-25 03:50 作者: 指耕作 時間: 2025-3-25 08:50 作者: 情愛 時間: 2025-3-25 12:26 作者: 軟膏 時間: 2025-3-25 19:46 作者: 廣告 時間: 2025-3-25 21:17 作者: 姑姑在炫耀 時間: 2025-3-26 03:16
https://doi.org/10.1007/978-981-13-1687-6gital information and thereby threaten the forensic investigation. A prominent anti-forensic paradigm is hiding data on different abstraction layers, e.g., the filesystem layer. In modern filesystems, private data can be hidden in many places, taking advantage of the structural and conceptual charac作者: 屈尊 時間: 2025-3-26 04:59 作者: 斷斷續(xù)續(xù) 時間: 2025-3-26 11:47 作者: MAZE 時間: 2025-3-26 15:06 作者: 仇恨 時間: 2025-3-26 17:30 作者: Flawless 時間: 2025-3-26 22:22 作者: 擔憂 時間: 2025-3-27 02:43
Mihir K. Sinha Ph.D.,Larry R. Padgett Ph.D.comes to a forensic analysis. Inside the SSD, data movement events occur without any user input. Recent research has suggested that SSDs can no longer be managed in the same manner when performing digital forensic examinations. In performing forensics analysis of SSDs, the events that take place in 作者: 大猩猩 時間: 2025-3-27 06:57 作者: 使困惑 時間: 2025-3-27 12:21
Mihir K. Sinha Ph.D.,Larry R. Padgett Ph.D.a forensics investigator needs to process in order to understand the sequence of events that happened on a system. However, ontology processing suffers from large disk consumption and a high computational cost. This paper presents Property Graph Event Reconstruction (PGER), a data normalization and 作者: 清楚 時間: 2025-3-27 14:19
https://doi.org/10.1007/978-94-007-5497-3his paper, we propose a self-adaptive authentication mechanism, ., which is designed to mitigate offline password-guessing attacks. For example, “11th July 2018, Nanjing, China, San Antonio, Texas, research” is a multi-item passphrase. It dynamically monitors items and identifies frequently used ite作者: OMIT 時間: 2025-3-27 18:05
Managing Interests and Expectations worms: Sasser, Slammer, Eternal Rocks, WannaCry, and Petya. Through this analysis, we use a deep neural network to successfully classify network traces of these worms along with normal traffic. Our hybrid approach includes a visualization that allows for further analysis and tracing of the network 作者: 抑制 時間: 2025-3-27 23:09 作者: Isometric 時間: 2025-3-28 02:09
fishy - A Framework for Implementing Filesystem-Based Data Hiding Techniquesgital information and thereby threaten the forensic investigation. A prominent anti-forensic paradigm is hiding data on different abstraction layers, e.g., the filesystem layer. In modern filesystems, private data can be hidden in many places, taking advantage of the structural and conceptual charac作者: pessimism 時間: 2025-3-28 08:06 作者: osteopath 時間: 2025-3-28 12:19 作者: 向外 時間: 2025-3-28 15:16
Digital Forensic Readiness Framework for Ransomware Investigation threat being malicious software (malware).?Ransomware, a variant of malware which encrypts files and retains the decryption key for ransom, has recently proven to become a global digital epidemic. The current method of mitigation and propagation of malware and its variants, such as anti-viruses, ha作者: 抵押貸款 時間: 2025-3-28 19:53
Forensics Analysis of an On-line Game over Steam Platformls instead of traditional channels like WhatsApp or Facebook. In this paper, we describe a methodology developed after conducting an in-depth digital forensic analysis of the central artifacts of a popular video-game - Counter Strike Nexon Zombies video-game (Steam platform) - where valuable artifac作者: 單片眼鏡 時間: 2025-3-29 00:54 作者: 沉默 時間: 2025-3-29 05:53 作者: 喊叫 時間: 2025-3-29 11:16 作者: 無表情 時間: 2025-3-29 11:23
Digital Forensics Event Graph Reconstructiona forensics investigator needs to process in order to understand the sequence of events that happened on a system. However, ontology processing suffers from large disk consumption and a high computational cost. This paper presents Property Graph Event Reconstruction (PGER), a data normalization and 作者: Needlework 時間: 2025-3-29 15:33
Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attackshis paper, we propose a self-adaptive authentication mechanism, ., which is designed to mitigate offline password-guessing attacks. For example, “11th July 2018, Nanjing, China, San Antonio, Texas, research” is a multi-item passphrase. It dynamically monitors items and identifies frequently used ite作者: 燈泡 時間: 2025-3-29 21:51 作者: 偉大 時間: 2025-3-30 01:17