We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,765 results
  1. Opposing agents evolve the research: a decade of digital forensics

    This study aims to address the growing cyber threats and the spread of digital misinformation, particularly intensified by digital transformation...

    Raghu Raman, Aditya Kumar Sahu, ... Prema Nedungadi in Multimedia Tools and Applications
    Article 11 June 2024
  2. Microsoft Azure and Cloud Forensics

    Chuck Easttom, Ph.D., D.Sc.
    Chuck Easttom, William Butler, ... Zehra Naseer in Windows Forensics
    Chapter 2024
  3. Digital Forensics

    Digital forensics is a multidisciplinary field combining elements of law and computer science to collect and analyze data from computer systems,...
    Dr. Jason Edwards in Mastering Cybersecurity
    Chapter 2024
  4. Towards adding digital forensics capabilities in software defined networking based moving target defense

    Moving Target Defense (MTD) is a security technique for Software Defined Networks (SDN) to change the attack surface constantly. Although MTD is an...

    Muhammad Faraz Hyder, Tasbiha Fatima, Saadia Arshad in Cluster Computing
    Article 24 March 2023
  5. Windows Forensics Understand Analysis Techniques for Your Windows

    This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems...

    Chuck Easttom, William Butler, ... Zehra Naseer
    Book 2024
  6. Cloud Computing Forensics: Dropbox Case Study

    This chapter describes how to use Android and iOS mobiles in data acquisition and in finding results. This analysis and study on new versions of the...
    Chapter 2022
  7. What Is Digital Forensics?

    This chapter introduces the concept of digital forensicsDigital forensics and provides a discussion of what computer forensics is, examining data in...
    Joakim Kävrestad, Marcus Birath, Nathan Clarke in Fundamentals of Digital Forensics
    Chapter 2024
  8. An insight into cloud forensic readiness by leading cloud service providers: a survey

    In today’s digital world, it is hard to imagine the Information Technology field without cloud computing as it saves millions of dollars every year...

    Pranitha Sanda, Digambar Pawar, V. Radha in Computing
    Article 17 April 2022
  9. Ensuring accountability in digital forensics with proxy re-encryption based chain of custody

    In the realm of digital forensics, the establishment of robust standards for maintaining the integrity of digital evidence is of paramount...

    Rachana Y. Patil, Yogesh H. Patil, ... Manjiri Ranjanikar in International Journal of Information Technology
    Article 21 January 2024
  10. GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment

    Cloud computing is the most useful computing technology for the new service progression. Due to the distributed nature of cloud computing, security...

    M. Arunkumar, K. Ashok Kumar in International Journal of Information Technology
    Article 13 March 2023
  11. An Insightful Analysis of Digital Forensics Effects on Networks and Multimedia Applications

    Humans have benefited greatly from technology, which has helped to raise standards of living and make important discoveries. But there are a lot of...

    Aishwarya Rajeev, P. Raviraj in SN Computer Science
    Article 31 January 2023
  12. Categorizing Tracing Techniques for Network Forensics

    The traceback problem is widely acknowledged as one of the most challenging issues in the field of information security, and it is crucial to find...
    Shraddha Chourasiya, Ayush Indurkar, ... Dikshant Gaikwad in Cyber Security and Digital Forensics
    Conference paper 2024
  13. Autopsy Forensics

    While skill, knowledge, and experience are the most important building blocks of a forensic examiner, having a competent tool is really helpful. This...
    Joakim Kävrestad, Marcus Birath, Nathan Clarke in Fundamentals of Digital Forensics
    Chapter 2024
  14. Assessing Current and Emerging Challenges in the Field of Digital Forensics

    This paper critically assesses the current and emerging challenges encountered in the field of Digital Forensics (DF) with reference to Cloud...
    Chapter 2023
  15. Fog Forensics: A Comprehensive Review of Forensic Models for Fog Computing Environment

    Numerous potential social advantages are offered by fog computing, including personalized healthcare, smart cities, agri technology, automated...
    Konrad Śniatała, Yashas Hariprasad, ... Michał Weissenberg in Information Security, Privacy and Digital Forensics
    Conference paper 2024
  16. Develo** Digital Forensics Expertise Competencies Through Courtroom Role-Play

    In an era where digital crimes are escalating, the proficiency of digital forensics experts in both technical analysis and legal testimony is...
    Conference paper 2024
  17. Digital Forensics AI: Evaluating, Standardizing and Optimizing Digital Evidence Mining Techniques

    The impact of AI on numerous sectors of our society and its successes over the years indicate that it can assist in resolving a variety of complex...

    Abiodun A. Solanke, Maria Angela Biasiotti in KI - Künstliche Intelligenz
    Article Open access 12 May 2022
  18. Web Browser Forensics

    Victoria Balkissoon
    Chuck Easttom, William Butler, ... Zehra Naseer in Windows Forensics
    Chapter 2024
  19. Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities

    Password manager and vault applications can be used by users to select strong passwords as well as storing user credentials locally or in the cloud....
    Aleck Nash, Kim-Kwang Raymond Choo in Digital Forensics and Cyber Crime
    Conference paper 2024
  20. Blockchain-based tamper-proof and transparent investigation model for cloud VMs

    In cloud forensics, ensuring the integrity of the evidence such that it is admissible in a court of law is essential. There is always a possibility...

    Pranitha Sanda, Digambar Pawar, V. Radha in The Journal of Supercomputing
    Article 25 May 2022
Did you find what you were looking for? Share feedback.