Search
Search Results
-
Opposing agents evolve the research: a decade of digital forensics
This study aims to address the growing cyber threats and the spread of digital misinformation, particularly intensified by digital transformation...
-
Microsoft Azure and Cloud Forensics
Chuck Easttom, Ph.D., D.Sc. -
Digital Forensics
Digital forensics is a multidisciplinary field combining elements of law and computer science to collect and analyze data from computer systems,... -
Towards adding digital forensics capabilities in software defined networking based moving target defense
Moving Target Defense (MTD) is a security technique for Software Defined Networks (SDN) to change the attack surface constantly. Although MTD is an...
-
Windows Forensics Understand Analysis Techniques for Your Windows
This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems...
-
Cloud Computing Forensics: Dropbox Case Study
This chapter describes how to use Android and iOS mobiles in data acquisition and in finding results. This analysis and study on new versions of the... -
What Is Digital Forensics?
This chapter introduces the concept of digital forensicsDigital forensics and provides a discussion of what computer forensics is, examining data in... -
An insight into cloud forensic readiness by leading cloud service providers: a survey
In today’s digital world, it is hard to imagine the Information Technology field without cloud computing as it saves millions of dollars every year...
-
Ensuring accountability in digital forensics with proxy re-encryption based chain of custody
In the realm of digital forensics, the establishment of robust standards for maintaining the integrity of digital evidence is of paramount...
-
GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment
Cloud computing is the most useful computing technology for the new service progression. Due to the distributed nature of cloud computing, security...
-
An Insightful Analysis of Digital Forensics Effects on Networks and Multimedia Applications
Humans have benefited greatly from technology, which has helped to raise standards of living and make important discoveries. But there are a lot of...
-
Categorizing Tracing Techniques for Network Forensics
The traceback problem is widely acknowledged as one of the most challenging issues in the field of information security, and it is crucial to find... -
Autopsy Forensics
While skill, knowledge, and experience are the most important building blocks of a forensic examiner, having a competent tool is really helpful. This... -
Assessing Current and Emerging Challenges in the Field of Digital Forensics
This paper critically assesses the current and emerging challenges encountered in the field of Digital Forensics (DF) with reference to Cloud... -
Fog Forensics: A Comprehensive Review of Forensic Models for Fog Computing Environment
Numerous potential social advantages are offered by fog computing, including personalized healthcare, smart cities, agri technology, automated... -
Develo** Digital Forensics Expertise Competencies Through Courtroom Role-Play
In an era where digital crimes are escalating, the proficiency of digital forensics experts in both technical analysis and legal testimony is... -
Digital Forensics AI: Evaluating, Standardizing and Optimizing Digital Evidence Mining Techniques
The impact of AI on numerous sectors of our society and its successes over the years indicate that it can assist in resolving a variety of complex...
-
Web Browser Forensics
Victoria Balkissoon -
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities
Password manager and vault applications can be used by users to select strong passwords as well as storing user credentials locally or in the cloud.... -
Blockchain-based tamper-proof and transparent investigation model for cloud VMs
In cloud forensics, ensuring the integrity of the evidence such that it is admissible in a court of law is essential. There is always a possibility...