Search
Search Results
-
Enhancing Reliability During Physical Memory Forensics: Strategies and Practices
Over the past decade, forensic investigators have incorporated memory forensics as a critical part of their investigation. Memory forensics yield...
-
Digital Forensics
Digital forensics is a multidisciplinary field combining elements of law and computer science to collect and analyze data from computer systems,... -
Windows Forensics Understand Analysis Techniques for Your Windows
This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems...
-
Opposing agents evolve the research: a decade of digital forensics
This study aims to address the growing cyber threats and the spread of digital misinformation, particularly intensified by digital transformation...
-
Information Security, Privacy and Digital Forensics Select Proceedings of the International Conference, ICISPD 2022
This volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022)....
-
Towards adding digital forensics capabilities in software defined networking based moving target defense
Moving Target Defense (MTD) is a security technique for Software Defined Networks (SDN) to change the attack surface constantly. Although MTD is an...
-
An MSDCNN-LSTM framework for video frame deletion forensics
Frame deletion detection is a challenging task in the field of digital video forensics. This paper proposes a deep-learning-based frame deletion...
-
Incident Response
Turning away from law enforcement, computer forensics is a common part of modern-day incident responseIncident response. Incident responseIncident... -
Computer and Network Forensics
This chapter discusses what constitutes digital evidence, the collection and analysis of digital evidence, the chain of custodyChain of custody, the... -
Categorizing Tracing Techniques for Network Forensics
The traceback problem is widely acknowledged as one of the most challenging issues in the field of information security, and it is crucial to find... -
DQNANFCT: design of a deep Q-learning network for augmented network forensics via integrated contextual trust operations
Network forensics helps analyze pre-emptive attacks and identify attackers using temporal behavior patterns. Most deep learning methods to design...
-
Forensics Concepts
Naseer Zehra zehra.naseer@Vanderbilt.Edu -
Extractions of Forensics Data with Wireshark
In this chapter, we will look at the challenges of obtaining forensics evidence from network capture files. First, we need to explain some basic... -
Data Hiding in Anti-forensics—Exploit Delivery Through Digital Steganography
Developments in digital forensics investigations have occurred along with those in anti-forensics. Legal issues involving cybercrime are difficult to... -
Microsoft Azure and Cloud Forensics
Chuck Easttom, Ph.D., D.Sc. -
Assessing Current and Emerging Challenges in the Field of Digital Forensics
This paper critically assesses the current and emerging challenges encountered in the field of Digital Forensics (DF) with reference to Cloud... -
Copy–move forgery detection in digital image forensics: A survey
The detection of copy-move forgeries has been of utmost relevance in the field of digital image forensics because of the explosive growth of image...
-
Digital Detectives: A Serious Point-and-Click Game for Digital Forensics
As cyberattacks increase yearly, the ongoing scarcity of cybersecurity professionals and lack of knowledge about digital forensics (DF) are... -
Windows Memory Forensics
Ramya Sai Bhagavatula -
Memory Forensics for Artefacts Recovery from Ether Transactions
Use of cryptocurrencies in crimes like money laundering, ransomware, narcotics trade and terror funding has been on increase. There is a disturbing...