3 Hits in 2.3 sec

Cvoip-Fru: Comprehensive Voip Forensics Report Utility

Alejandro Villegas, Cihan Varol
2014 Zenodo  
Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product.  ...  Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity.  ...  Overall, CVOIP-FRU's functionality will be instrumental for the VoIP Digital Evidence Forensics Standard Operating Procedure (DEFSOP) by gathering data that can be easily implemented into a report format  ... 
doi:10.5281/zenodo.1091145 fatcat:yqvjv226cngdph4jvd6fz7rq3m

A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

Suleman Khan, Muhammad Shiraz, Ainuddin Wahid Abdul Wahab, Abdullah Gani, Qi Han, Zulkanain Bin Abdul Rahman
2014 The Scientific World Journal  
Network forensics enables investigation and identification of network attacks through the retrieved digital content.  ...  However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms  ...  with digital evidence Test bed Time consuming, bandwidth utilization Collects, analyzes, and performs forensics in VoIP DEFSOP operational stage VoIPEM [62] L O VoIP Evidence Model  ... 
doi:10.1155/2014/547062 pmid:25097880 pmcid:PMC4109117 fatcat:jpxfykm4mfba5ehjgydvyirzte

Rancang Bangun Secure Mobile IP PBX Berbasis Raspberry Pi Dalam Mendukung Komunikasi Kegiatan Luar Taruna Akademi Angkatan Udara

Muhammad Kharrel Dwiadamajati, Muhammad Fahrurozi, Edi Supartono, Bambang Gastomo
2021 Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO)  
Server VoIP ini menggantikan PABX konvensional dan sebagai sarana komunikasi meskipun tidak ada sinyal internet.  ...  Wang, “VoIP Digital Evidence Forensics Standard Operating Procedure (DEFSOP),” in 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, Nov  ...  Rawat, “Detecting unprotected SIP-based voice over IP traffic,” in 2016 4th International Symposium on Digital Forensic and Security (ISDFS), Little Rock, AR, USA, Apr. 2016, pp. 44–48. doi  ... 
doi:10.54706/senastindo.v3.2021.126 fatcat:cgd6jolb65bnhgsx7xvmxg4f24