標(biāo)題: Titlebook: Digital Forensics and Cyber Crime; 4th International Co Marcus Rogers,Kathryn C. Seigfried-Spellar Conference proceedings 2013 ICST Institu [打印本頁] 作者: 果園 時間: 2025-3-21 19:56
書目名稱Digital Forensics and Cyber Crime影響因子(影響力)
書目名稱Digital Forensics and Cyber Crime影響因子(影響力)學(xué)科排名
書目名稱Digital Forensics and Cyber Crime網(wǎng)絡(luò)公開度
書目名稱Digital Forensics and Cyber Crime網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Digital Forensics and Cyber Crime被引頻次
書目名稱Digital Forensics and Cyber Crime被引頻次學(xué)科排名
書目名稱Digital Forensics and Cyber Crime年度引用
書目名稱Digital Forensics and Cyber Crime年度引用學(xué)科排名
書目名稱Digital Forensics and Cyber Crime讀者反饋
書目名稱Digital Forensics and Cyber Crime讀者反饋學(xué)科排名
作者: nitroglycerin 時間: 2025-3-21 22:53
Cloud Forensic Maturity Modelnsic Investigative Architecture (CFIA) and the Cloud Forensic Capability Matrix (CFCM). The CFMM is developed in order to create a reference model to evaluate and improve cloud forensic maturity. It is a part an on-going project, and is evaluted by a panel of experts and practitioners as a first ste作者: 的’ 時間: 2025-3-22 03:17
Identifying Remnants of Evidence in the Cloudn seize, the evidence is likely located in remote data centers operated by a service provider; and may even be in multiple locations (and jurisdictions) across the world. The most practical approach for an investigator when cloud computing has been used is to execute a warrant that requires the serv作者: 開始發(fā)作 時間: 2025-3-22 07:06 作者: 影響 時間: 2025-3-22 12:22
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purpoe victim’s computer. Unfortunately, currently proposed dynamic malware analysis methods and sandbox solutions have a number of limitations that may lead the investigators to ambiguous conclusions. In this research, the limitations of the use of current dynamic malware analysis methods in digital for作者: 凹槽 時間: 2025-3-22 14:59
Measuring the Preference of Image Content for Self-reported Consumers of Child Pornographyonsumers may not necessarily be representative of their preferences. In addition, a literature review of the available scales or measurements, which assessed pornography preference, yielded scarce results regarding images of child sexual victimization. First, this paper will review some of the empir作者: 凹槽 時間: 2025-3-22 20:45
Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Studyis research explores peoples’ engagement in bypassing the Internet proxy and if it is related to cyber criminal engagement. Through an experimental design, participants were randomly assigned to three groups. Using manipulation paragraphs, in the first group (Group 1), a positive view on the Interne作者: brachial-plexus 時間: 2025-3-22 22:32 作者: 不可磨滅 時間: 2025-3-23 03:34
Research Trends in Digital Forensic Science: An Empirical Analysis of Published Researchin this domain. This research studied, categorized and analyzed a sample of five-hundred publications (n=500) from this discipline. The results indicated that the rate of publication in this domain continues to increase over time. Additionally, results showed an overall lack of anti-forensics resear作者: 在前面 時間: 2025-3-23 06:41 作者: animated 時間: 2025-3-23 11:12
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2files. One basic property of cryptographic Hash Functions is the avalanche effect that causes a significantly different output if an input is changed slightly. As some applications also need to identify similar files (e.g. spam/virus detection) this raised the need for .. In recent years, several ap作者: Charade 時間: 2025-3-23 16:29
Investigating File Encrypted Material Using NTFS $logfilef how to determine evidential value from it. This research is proposing a methodology for locating the original plaintext file that was encrypted on a hard disk drive. The technique also incorporates a method of determining the associated plaintext contents of the encrypted file. This is achieved by作者: 制造 時間: 2025-3-23 20:26 作者: ADAGE 時間: 2025-3-24 00:54 作者: RADE 時間: 2025-3-24 04:06
https://doi.org/10.1007/978-3-642-39891-9algorithms; cloud computing; database forensics; encryption; mobile devices作者: 蜿蜒而流 時間: 2025-3-24 07:53
978-3-642-39890-2ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013作者: AVOW 時間: 2025-3-24 12:56
Marcus Rogers,Kathryn C. Seigfried-SpellarFast conference proceedings.State of the art report.Up to date results作者: escalate 時間: 2025-3-24 18:08
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/d/image/279327.jpg作者: indifferent 時間: 2025-3-24 20:33 作者: BALE 時間: 2025-3-25 01:06
Digital Forensics and Cyber Crime978-3-642-39891-9Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: Noisome 時間: 2025-3-25 06:27 作者: 有發(fā)明天才 時間: 2025-3-25 07:51 作者: scoliosis 時間: 2025-3-25 11:48 作者: 甜得發(fā)膩 時間: 2025-3-25 16:02
Tejaswini Eregowda,Sanjeeb Mohapatragiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been proposed. This paper presents an overview and critique of the state of the art in the field. An independent comparative study is presented using an unprecedented experim作者: Texture 時間: 2025-3-25 23:32
Ashwin Singh,Arbind Kumar Patel,Manish Kumare victim’s computer. Unfortunately, currently proposed dynamic malware analysis methods and sandbox solutions have a number of limitations that may lead the investigators to ambiguous conclusions. In this research, the limitations of the use of current dynamic malware analysis methods in digital for作者: 同音 時間: 2025-3-26 03:39 作者: 價值在貶值 時間: 2025-3-26 04:53
https://doi.org/10.1007/978-3-031-13040-3is research explores peoples’ engagement in bypassing the Internet proxy and if it is related to cyber criminal engagement. Through an experimental design, participants were randomly assigned to three groups. Using manipulation paragraphs, in the first group (Group 1), a positive view on the Interne作者: 興奮過度 時間: 2025-3-26 11:06 作者: Graphite 時間: 2025-3-26 14:52
Yoshiki Yamagata,Ayyoob Sharifiin this domain. This research studied, categorized and analyzed a sample of five-hundred publications (n=500) from this discipline. The results indicated that the rate of publication in this domain continues to increase over time. Additionally, results showed an overall lack of anti-forensics resear作者: lactic 時間: 2025-3-26 18:34
https://doi.org/10.1007/978-3-319-75798-8ique based on wavelet transform and the least square estimator to enhance the classical LBP. First, Wavelet transform is used to decompose a given image into four kinds of frequency images from which the features of that image can be extracted. Then, the least square estimation of local difference b作者: blackout 時間: 2025-3-26 23:09 作者: PET-scan 時間: 2025-3-27 02:35
Resilience: A New Paradigm of Nuclear Safetyf how to determine evidential value from it. This research is proposing a methodology for locating the original plaintext file that was encrypted on a hard disk drive. The technique also incorporates a method of determining the associated plaintext contents of the encrypted file. This is achieved by作者: 繁殖 時間: 2025-3-27 05:35
Resilience: A New Paradigm of Nuclear Safetyeen developed to insert information into a DNA sequence for the purpose of data storage, watermarking, or communication of secret messages. The ability to detect, extract, and decode messages from DNA is important for forensic data collection and for data security. We have developed a software toolk作者: 切掉 時間: 2025-3-27 13:19
https://doi.org/10.1007/978-94-007-0785-6abases are exploited in computer crimes. Even though various investigations involving databases have been explored, very little amount of research has been done on database forensics. This paper briefly describes a database reconstruction algorithm presented in an earlier work and shows the limitati作者: Confess 時間: 2025-3-27 15:39 作者: 財政 時間: 2025-3-27 20:54
https://doi.org/10.1007/978-3-031-13040-3t and self-reported proxy bypass engagement. The results also showed that individuals with more knowledge in computers are more likely to bypass the Internet proxy. However, individuals with better knowledge in computers are not necessarily the ones that are more likely to commit cyber criminal acti作者: 態(tài)學(xué) 時間: 2025-3-28 01:01 作者: olfction 時間: 2025-3-28 02:26 作者: fulmination 時間: 2025-3-28 08:08 作者: jaundiced 時間: 2025-3-28 11:15 作者: lymphoma 時間: 2025-3-28 18:26 作者: 定點 時間: 2025-3-28 21:02
Research Trends in Digital Forensic Science: An Empirical Analysis of Published Researchrch. Additionally, results exemplified a lack of quantitative research in the discipline, with only 20% of the research papers using quantitative methods, and 80% using qualitative methods. Furthermore, results showed that the largest portion of the research (42.9%) from the examined sample originat作者: 以煙熏消毒 時間: 2025-3-29 00:34
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2 First, it fulfills all our proposed defining properties, second, it outperforms existing approaches especially with respect to run time performance and third it has two detections modes. The regular mode of . is used to identify similar files whereas the f-mode is optimal for fragment detection, i.作者: 前面 時間: 2025-3-29 03:58
On the Completeness of Reconstructed Data for Database Forensics presents two different techniques that can be used in reconstructing more tuples in a relation and provide corroborating evidence to claims about the data on a database. A typical example is used to describe the limitation of the database reconstruction algorithm and how the limitation can be overc作者: Nomogram 時間: 2025-3-29 07:34 作者: 沙漠 時間: 2025-3-29 11:34
CSR, Sustainability, Ethics & Governanceinvestigations, and forensic implications of all cloud deployment models. The analysis serves as feedback and input for integrating forensic considerations into cloud standardization processes from early stage, and specifies requirements and directions for further standardization efforts.作者: 轎車 時間: 2025-3-29 15:45 作者: Arthr- 時間: 2025-3-29 23:34
Tejaswini Eregowda,Sanjeeb Mohapatrar presents an overview and critique of the state of the art in the field. An independent comparative study is presented using an unprecedented experimental design and data set, as well as proposals for improvements and future work.作者: cocoon 時間: 2025-3-30 00:17 作者: antenna 時間: 2025-3-30 06:02
Investigating File Encrypted Material Using NTFS $logfile characterising the file-encryption process as a series of file I/O operations and correlating those operations with the corresponding events in the NTFS $logfile file. The occurrence of these events has been modelled and generalised to investigate file-encryption. This resulted in the automated analysis of $logfile in .software.作者: LEER 時間: 2025-3-30 11:54
Finding Data in DNA: Computer Forensic Investigations of Living Organismsit that detects the presence of a hidden message within a DNA sequence, and deciphers that message. In order to decode a message we are modifying several existing cryptanalysis tools that have been developed for solving simple substitution ciphers and compare their performance.作者: exhilaration 時間: 2025-3-30 14:17 作者: Pandemic 時間: 2025-3-30 18:30