Abstract
No abstract available.
Cited By
- Mishra M, Jain N and Kumar A (2023). Reviewing Image Data: Detecting Forgery Using a Robust Forensic Method, SN Computer Science, 4:6, Online publication date: 8-Nov-2023.
- Amer N and Al-Halabi Y Android Forensics Tools and Security Mechanism Proceedings of the Fourth International Conference on Engineering & MIS 2018, (1-6)
- Alrajeh D, Pasquale L and Nuseibeh B On evidence preservation requirements for forensic-ready systems Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (559-569)
- Schramp R (2017). Live transportation and RAM acquisition proficiency test, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 20:C, (44-53), Online publication date: 1-Mar-2017.
- Colombini C and Colella A Digital profiling Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems, (330-343)
- Grier J (2011). Detecting data theft using stochastic forensics, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 8, (S71-S77), Online publication date: 1-Aug-2011.
- Yen P, Yang C and Ahn T Design and implementation of a live-analysis digital forensic system Proceedings of the 2009 International Conference on Hybrid Information Technology, (239-243)
- Kiltz S, Hoppe T and Dittmann J A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump Proceedings of the 16th international conference on Digital Signal Processing, (1135-1140)
- Barradas-Acosta A, Anaya E, Nakano-Miyatake M and Perez-Meana H (2009). Neural network based attack detection algorithm, WSEAS Transactions on Computers, 8:6, (905-915), Online publication date: 1-Jun-2009.
- Lim N and Khoo A (2009). Forensics of computers and handheld devices, Communications of the ACM, 52:6, (132-135), Online publication date: 1-Jun-2009.
- Barradas-Acosta A, Aguirre-Anaya E and Perez-Meana M Attacks recognition using recurrent neural network Proceedings of the international conference on Computational and information science 2009, (402-409)
- Akhter F E-Commerce Security Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, (298-303)
- Bradford P and Ray D Semantics for a domain-specific language for the digital forensics domain Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, (1-3)
- Austin R Digital forensics on the cheap Proceedings of the 4th annual conference on Information security curriculum development, (1-5)
- Stahlberg P, Miklau G and Levine B Threats to privacy in the forensic analysis of database systems Proceedings of the 2007 ACM SIGMOD international conference on Management of data, (91-102)
- Adelstein F (2006). Live forensics, Communications of the ACM, 49:2, (63-66), Online publication date: 1-Feb-2006.
- Casey E (2006). Investigating sophisticated security breaches, Communications of the ACM, 49:2, (48-55), Online publication date: 1-Feb-2006.
- Abraham T Event sequence mining to develop profiles for computer forensic investigation purposes Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54, (145-153)
- Cronin E, Sherr M and Blaze M Listen too closely and you may be confused Proceedings of the 13th international conference on Security protocols, (245-249)
Index Terms
- Digital Evidence and Computer Crime
Recommendations
Dempster-Shafer Evidence Combining for Anti-Honeypot Technologies
Honeypots are network surveillance architectures designed to resemble easy-to-compromise computer systems. They are deployed to trap hackers in order to help security professionals capture, control, and analyze malicious Internet attacks and other ...
Digital watermarking using zerotree of DCT
A watermarking technique has been proposed as a method to embed an invisible signal into multimedia data so as to attest the owner identification and discourage the unauthorized copying. In this paper, an efficiently DCT based watermarking technique is ...