Filters








3,478 Hits in 3.1 sec

Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation [chapter]

Przemyslaw Pajek, Elias Pimenidis
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jyopc6cf5ze5vipjlm4aztcffi" style="color: black;">Communications in Computer and Information Science</a> </i> &nbsp;
The methodologies used against the computer forensics processes are collectively called Anti-Forensics.  ...  This paper explores the anti forensics problem in various stages of computer forensic investigation from both a theoretical and practical point of view.  ...  In most cases counter-forensics methodologies are available through internet search engines.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-04062-7_16">doi:10.1007/978-3-642-04062-7_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zqgponfphfdfhe6cyz253mpy64">fatcat:zqgponfphfdfhe6cyz253mpy64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706044845/http://roar.uel.ac.uk/1508/1/Pajek%20%26%20Pimenidis%20ICGS3%202009.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ff/50/ff503f046ef0c354ba161f65f5ca39c7d4ca3e35.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-04062-7_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

General Theoretical Issues of Improving Private Forensic Methods In The Field Of Combat Against Cybercrime

Khamidov Bakhtiyor Khamidovich Et al.
<span title="2021-01-01">2021</span> <i title="Auricle Technologies, Pvt., Ltd."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/setbinz35ncmln6lkcdgrr6zsy" style="color: black;">Psychology (Savannah, Ga.)</a> </i> &nbsp;
In this regard, proposals and recommendations were developed for the development of private criminology methodologies for the development of the theory of forensic science.  ...  Based on this, the most favorable directions for combating these crimes in Uzbekistan were selected.  ...  Zaitsev an automated methodology for the investigation of certain types of crimes, as well as recommendations, methods and techniques for their use in preliminary investigations.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17762/pae.v58i1.1153">doi:10.17762/pae.v58i1.1153</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lu52vwzyiffunclmvea4xcs6ha">fatcat:lu52vwzyiffunclmvea4xcs6ha</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210304060832/http://psychologyandeducation.net/pae/index.php/pae/article/download/1153/967" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/10/fe103531341582e91365c843d60a9afa984a65f1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17762/pae.v58i1.1153"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

18: Plethora of Cyber Forensics

N Sridhar, Dr.D.Lalitha Bhaskari, Dr.P.S. Avadhani
<span title="">2011</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats.  ...  This paper focuses on briefing of Cyber forensics, various phases of cyber forensics, handy tools and new research trends and issues in this fascinated area.  ...  Forensics Methodology The International Association of Computer Investigative Specialists (IACIS) has developed a forensic methodology which can be summarized as follows:  Protect the Crime Scene, power  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2011.021118">doi:10.14569/ijacsa.2011.021118</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2ytpswmy7zbjrf4rr3st3pm7mq">fatcat:2ytpswmy7zbjrf4rr3st3pm7mq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20131229021609/http://thesai.org:80/Downloads/Volume2No11/Paper%2018-%20Plethora%20of%20Cyber%20Forensics.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/53/db/53db6934f762e7e5babe87b9e635a8ec9ceb85df.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2011.021118"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Qualitative Perspective of Practical Implication of Forensic Accounting for Fraud Detection and Prevention in Pakistan

Zahid Iqbal, Rehan Aslam
<span title="2020-06-26">2020</span> <i title="RMC Journal of Social Sciences and Humanities, Research and Management Consultants (Pvt) Ltd"> RMC Journal of Social Sciences and Humanities </i> &nbsp;
The findings of the study indicated that forensic accounting scope is broad, especially regarding the increasing ratio of white-collar crimes and digital crimes, and in a near-future lot of opportunities  ...  This study followed a qualitative approach to collect data through interviews from both participants, including academicians and practitioners who are working in a prestigious academic institution and  ...  "Yes I think forensic accounting will be helpful for not only a professional business owner but also for the chartered accountant, cost and management accountant, and for a lawyer as well with reference  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46256/rmcjsochum.v1i1.22">doi:10.46256/rmcjsochum.v1i1.22</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t34dbkj4i5gthmxehy7u5hyhom">fatcat:t34dbkj4i5gthmxehy7u5hyhom</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200713134308/https://journal.rnmconsultants.org/index.php/jssh/article/download/22/20" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0b/54/0b5473a2de95fa5a66a241b9383e673cbaf8a2f1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46256/rmcjsochum.v1i1.22"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Aspects of Digital Forensics in South Africa

Alastair Irons, Jacques Ophoff
<span title="">2016</span> <i title="Informing Science Institute"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/osrw7zcn3ncvrli6nbunyykxde" style="color: black;">Interdisciplinary Journal of Information, Knowledge, and Management</a> </i> &nbsp;
The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime  ...  , by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universities.  ...  The search spanned all university programs and used a set of relevant keywords: computer forensics, digital forensics, forensics, forensic, cybercrime, digital crime, computer crime, computer security,  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.28945/3576">doi:10.28945/3576</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4kzbziayjjhwbbbi56cemfshjq">fatcat:4kzbziayjjhwbbbi56cemfshjq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721191941/http://www.ijikm.org/Volume11/IJIKMv11p273-283Irons2689.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/46/aa/46aa245562e01f3229109bec7df097c36c82e83f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.28945/3576"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length

Liang Yang, Tiegang Gao, Yan Xuan, Hang Gao
<span title="">2016</span> <i title="IGI Global"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2ylws7dtcrfrzew4pju3nemchy" style="color: black;">International Journal of Digital Crime and Forensics</a> </i> &nbsp;
A novel image forensic algorithm against contrast modification based on merged weight histogram of run length is proposed.  ...  Large amounts of experiments show that, the proposed algorithm has low cost of computation complexity, compared with some existing scheme, and it has better performance with many test databases, furthermore  ...  For example, Stamm and Liu (2010) 2015) proposed a simple image forensic algorithm based on second-order statistics derived from the co-occurrence matrix, the algorithm can resist the counter-forensic  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4018/ijdcf.2016040103">doi:10.4018/ijdcf.2016040103</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yfa6p3td6jecbi4gffmxkw2i2m">fatcat:yfa6p3td6jecbi4gffmxkw2i2m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190225103942/http://pdfs.semanticscholar.org/6135/2edd36e1e187e5a315458a749aad9708f87d.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/61/35/61352edd36e1e187e5a315458a749aad9708f87d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4018/ijdcf.2016040103"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Combating Against Anti-Forensics Aligned with E-mail Forensics

Sridhar Neralla, D. Lalitha Bhaskari, P. S. Avadhani
<span title="2013-10-18">2013</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
This paper elucidates the process of identifying such anti-forensics applied in e-mail forensics. This paper proposes a methodology for combating against anti-forensics in this regard.  ...  Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals' uses sophisticated technological knowledge and always they plan to escape from the clutches of law.  ...  Proposal methodology discussed for each category of anti-forensics applied on e-mail forensics.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/13817-1849">doi:10.5120/13817-1849</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5sxjo75skja7rl2h3l5yj7xqti">fatcat:5sxjo75skja7rl2h3l5yj7xqti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604045121/https://research.ijcaonline.org/volume79/number15/pxc3891849.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/ae/25ae29f3cb0a9a9446b671c7ba6b0ae69b0dab1d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/13817-1849"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Forensic Analysis for Monitoring Database Transactions [chapter]

Harmeet Kaur Khanuja, Dattatraya S. Adane
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jyopc6cf5ze5vipjlm4aztcffi" style="color: black;">Communications in Computer and Information Science</a> </i> &nbsp;
In this article we propose a forensic methodology for private banks to have ongoing monitoring system as per Reserve Bank of India (RBI) guidelines for financial transactions which will check their database  ...  Database forensics aids in the qualification and investigation of databases and facilitates a forensic investigator to prove a suspected crime which can be used to prevent illegitimate banking transactions  ...  Fraudulent banking activities are becoming more and more sophisticated which is threatening the security and trust of online banking business [1,2] resulting as a major issue for handling financial crimes  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44966-0_19">doi:10.1007/978-3-662-44966-0_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/c5jk6iryqvg4pggiyohbonmhla">fatcat:c5jk6iryqvg4pggiyohbonmhla</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190217152138/http://pdfs.semanticscholar.org/05ca/7657688e0434830956964701e256f8dbbdfd.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/ca/05ca7657688e0434830956964701e256f8dbbdfd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44966-0_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The anti-forensics challenge

Kamal Dahbur, Bassil Mohammad
<span title="">2011</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/avyf4wdcyzf6fdvh66wyt6v6ku" style="color: black;">Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications - ISWSA &#39;11</a> </i> &nbsp;
Computer and Network Forensics has emerged as a new field in IT that is aimed at acquiring and analyzing digital evidence for the purpose of solving cases that involve the use, or more accurately misuse  ...  On the opposite side, Anti-Forensics has recently surfaced as a field that aims at circumventing the efforts and objectives of the field of computer and network forensics.  ...  A Distributed Denial of Service attack (DDoS) is a good example for a computer crime where the computing system is used as a mean as well as a target.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1980822.1980836">doi:10.1145/1980822.1980836</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iswsa/DahburM11.html">dblp:conf/iswsa/DahburM11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/56orsbyb2zcrrkakyjgkfmfph4">fatcat:56orsbyb2zcrrkakyjgkfmfph4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809013130/https://www.homeworkmarket.com/sites/default/files/q4/12/12/the_anti-forensics_challenge.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/02/d5/02d50f39cfaa53fd00dc5ff44929103df5a9cccc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1980822.1980836"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Об особенностях раскрытия и расследования киберпреступлений

Алимжан Матчанов
<span title="2020-09-25">2020</span> <i title="inScience LLC"> Общество и инновации </i> &nbsp;
The significance of the study is due to the need for a new conceptual, comprehensive approach to the methodology for disclosing and investigating cybercrimes.  ...  Consequently, a crime, that is committed in cyberspace is illegal interference in the operation of computers, computer programs and networks, unauthorized modification of computer data, as well as other  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47689/10.47689/2181-1415-vol1-iss1-pp155-165">doi:10.47689/10.47689/2181-1415-vol1-iss1-pp155-165</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fzcpxwqzo5eqhinvrqeh524xda">fatcat:fzcpxwqzo5eqhinvrqeh524xda</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200929224621/https://inscience.uz/index.php/socinov/article/download/13/2" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/2e/cd2e67b20206fc406c21fceb22ff94e343336353.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47689/10.47689/2181-1415-vol1-iss1-pp155-165"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Methodology for Cyber Crime Identification using Email Corpus based on Gaussian Mixture Model

V. Sreenivasulu, R. Satya Prasad
<span title="2015-05-20">2015</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
Mixtures of data mining models along with the related methodologies are proposed in this paper to facilitate the email forensic assessor.  ...  In order to investigate the cyber crimes, there is an immense need to analyze the bulky email gatherings forensically. Data mining methods help in analyzing these large collections of data.  ...  The practice of emails for the fraudulent actions is also emerging with an elevated speed. Forensic Analysis of these emails can probe or prove a crime committed.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/20616-3315">doi:10.5120/20616-3315</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vd3mwqgfxrhjtjavmem4vagps4">fatcat:vd3mwqgfxrhjtjavmem4vagps4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922213516/http://research.ijcaonline.org/volume117/number13/pxc3903315.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/06/f8/06f831b55fb55669fc10b057f68b201d22786642.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/20616-3315"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Cyber Crime Forensics

Saad Subair, Derar Yosif, Abdelgader Ahmed, Christopher Thron
<span title="2022-05-30">2022</span> <i title="Publishing House International Enterprise"> International Journal of Emerging Multidisciplinaries: Computer Science &amp; Artificial Intelligence </i> &nbsp;
Digital forensics or computer forensics which the process of securing digital evidence against the crime is becoming inevitable.  ...  Digital evidence is the foundation for any digital forensic investigation that can be collected by several means using technologies and scientific crime scene investigation.  ...  ACKNOWLEDGEMENTS The authors would like to thank International University of Africa, Khartoum, Sudan, for assistance they rendered concerning this work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.54938/ijemdcsai.2022.01.1.37">doi:10.54938/ijemdcsai.2022.01.1.37</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/peed6zryczbgjau4h4hwxvh3jq">fatcat:peed6zryczbgjau4h4hwxvh3jq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220610052024/http://ojs.ijemd.com/index.php/ComputerScienceAI/article/download/37/27" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b0/a5/b0a5bd2cd50b953f4bc0044d28b87cdce241277d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.54938/ijemdcsai.2022.01.1.37"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Forensic Resources For Network Professionals

Stephen J. Specker, Kenneth R. Janson
<span title="2010-12-17">2010</span> <i title="Clute Institute"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/crmmti2buzdudkkg7fnsppoqfq" style="color: black;">Review of Business Information Systems (RBIS)</a> </i> &nbsp;
Securing the systems that they are entrusted to manage is a task of primary importance.  ...  This study investigates principal forensic techniques that are available to the network professional and provides an efficient access path to practical solutions to the post-breach segment of security  ...  As a user, you're often trying to fix problems of your own making. However, solving a computer crime is more like trying to solve a more traditional crime.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.19030/rbis.v14i2.497">doi:10.19030/rbis.v14i2.497</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h4j5gtjc6vfvjmibkrct2ah62u">fatcat:h4j5gtjc6vfvjmibkrct2ah62u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427030348/https://clutejournals.com/index.php/RBIS/article/download/497/484" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/a4/fea4a514d4d2d6f332f49e658d09227aa70b8006.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.19030/rbis.v14i2.497"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Importance of Validating Evidence Integrity in solving Crime

Fatima Gul
<span title="2018-12-07">2018</span> <i title="Lahore Garrison University"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vzqo6cb5g5a25owejnok4odoqi" style="color: black;">International journal for electronic crime investigation</a> </i> &nbsp;
For solving any crime, evidence should be admissible in court of law by protecting its integrity.  ...  At present time, the crime rate is growing fast and this alarming rise can be controlled by using evidence as a key component.  ...  As a result of this, the weaknesses in the forensic methodology due to advancement can arise issues for the legal practice.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.54692/ijeci.2019.030124">doi:10.54692/ijeci.2019.030124</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qgfq3mmqonbxjk3d56vn6dplk4">fatcat:qgfq3mmqonbxjk3d56vn6dplk4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220421014147/http://ijeci.lgu.edu.pk/index.php/ijeci/article/download/24/23" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/14/3f/143f284bc76e89624c348e09154fb1155217ea49.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.54692/ijeci.2019.030124"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities [chapter]

Mohammed I. Alghamdi
<span title="2021-12-08">2021</span> <i title="IntechOpen"> Cybersecurity Threats with New Perspectives </i> &nbsp;
Therefore, this chapter aimed at examining the use of digital forensics in countering cybercrimes, which has been a critical breakthrough in cybersecurity.  ...  Nevertheless, the chapter has also observed the use of USB forensics, intrusion detection and artificial intelligence as major opportunities for digital forensics that can make the processes easier, efficient  ...  To counter this emerging threat, digital forensics has gained major attention in resolving cybersecurity threats.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/intechopen.94452">doi:10.5772/intechopen.94452</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dg6xxu5tyfawhjomggmyi3znzq">fatcat:dg6xxu5tyfawhjomggmyi3znzq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211216043749/https://api.intechopen.com/chapter/pdf-download/76151.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/48/b5/48b5e9a8006c5a737e867279d2cdcf9db290d1d5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/intechopen.94452"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 3,478 results