Investigating sophisticated security breaches
Communications of the ACM - Next-generation cyber forensics
Next-generation digital forensics
Communications of the ACM - Next-generation cyber forensics
The advent of trusted computing: implications for digital forensics
Proceedings of the 2006 ACM symposium on Applied computing
Mastering Windows Network Forensics and Investigation (Mastering)
Mastering Windows Network Forensics and Investigation (Mastering)
Defining a Process Model for Forensic Analysis of Digital Devices and Storage Media
SADFE '07 Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering
An Ad Hoc Review of Digital Forensic Models
SADFE '07 Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering
ICNC '07 Proceedings of the Third International Conference on Natural Computation - Volume 05
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations
A strategy for testing hardware write block devices
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A cyber forensics ontology: Creating a new approach to studying cyber forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are exponentially growing. Unfortunately, based on the current voluminous computer crime incidents, the ICT deployments under UC infrastructures might jeopardize the organizations if they ignore the imminent necessity of DF in their homogeneous/heterogeneous ISs. Most enterprises are dearth of vigilance concerning the above issues although they might be aware that the salient and stringent computer crimes are capable of devastating the company's intangible assets silently. Vandalism of intellectual property or conducting industrial espionage for the valuable assets via trustworthy UC networks becomes an approaching menace. Hence, the DF plays an essential role in the information security arena. Demonstrably, there is no one DF suite can encompass all aspects or purposes due to the dynamic diversities of computer crimes in their natures. Interchangeably utilizing various DF tools is a decent approach to find the causes for the associate computer crimes and prevents the related information security incidents from occurring. At last, a DF scenario review utilizing the proposed ontology-driven model with respect to the UC environment was conducted and demonstrated.