Investigating sophisticated security breaches
Communications of the ACM - Next-generation cyber forensics
Live forensics: diagnosing your system without killing it first
Communications of the ACM - Next-generation cyber forensics
Event sequence mining to develop profiles for computer forensic investigation purposes
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
Threats to privacy in the forensic analysis of database systems
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
On the (un)reliability of eavesdropping
International Journal of Security and Networks
Digital forensics on the cheap: teaching forensics using open source tools
Proceedings of the 4th annual conference on Information security curriculum development
Semantics for a domain-specific language for the digital forensics domain
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Strategic planning for the computer science security
WSEAS Transactions on Computers
Forensics of computers and handheld devices: identical or fraternal twins?
Communications of the ACM - One Laptop Per Child: Vision vs. Reality
Attacks recognition using recurrent neural network
CIS'09 Proceedings of the international conference on Computational and information science 2009
Multimedia Forensics Is Not Computer Forensics
IWCF '09 Proceedings of the 3rd International Workshop on Computational Forensics
Neural network based attack detection algorithm
WSEAS Transactions on Computers
Design and implementation of a live-analysis digital forensic system
Proceedings of the 2009 International Conference on Hybrid Information Technology
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Listen too closely and you may be confused
Proceedings of the 13th international conference on Security protocols
Integrated computer forensic investigation model based on Malaysian standards
International Journal of Electronic Security and Digital Forensics
Digital profiling: a computer forensics approach
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
A study on block-based recovery of damaged digital forensic evidence image
Multimedia Tools and Applications
A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A survey of main memory acquisition and analysis techniques for the windows operating system
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Persistent systems techniques in forensic acquisition of memory
Digital Investigation: The International Journal of Digital Forensics & Incident Response
An adaptive method to identify disk cluster size based on block content
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Case study: Network intrusion investigation - Preparation and challenges
Digital Investigation: The International Journal of Digital Forensics & Incident Response
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Digital Investigation as a distinct discipline: A pedagogic perspective
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Computer forensic timeline visualization tool
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Detecting data theft using stochastic forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
FORZA - Digital forensics investigation framework that incorporate legal issues
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Digital Investigation: The International Journal of Digital Forensics & Incident Response
On the role of file system metadata in digital forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Unification of relative time frames for digital forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Tool review: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A hierarchical, objectives-based framework for the digital investigations process
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Generalizing sources of live network evidence
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Analysis of firewall log-based detection scenarios for evidence in digital forensics
International Journal of Electronic Security and Digital Forensics
SAFECOMP'12 Proceedings of the 31st international conference on Computer Safety, Reliability, and Security
Hi-index | 0.00 |