We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,710 results
  1. Enhancing Reliability During Physical Memory Forensics: Strategies and Practices

    Over the past decade, forensic investigators have incorporated memory forensics as a critical part of their investigation. Memory forensics yield...

    Mariya Shafat Kirmani, M. Tariq Banday in SN Computer Science
    Article 12 January 2024
  2. Digital Forensics

    Digital forensics is a multidisciplinary field combining elements of law and computer science to collect and analyze data from computer systems,...
    Dr. Jason Edwards in Mastering Cybersecurity
    Chapter 2024
  3. Windows Forensics Understand Analysis Techniques for Your Windows

    This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems...

    Chuck Easttom, William Butler, ... Zehra Naseer
    Book 2024
  4. Opposing agents evolve the research: a decade of digital forensics

    This study aims to address the growing cyber threats and the spread of digital misinformation, particularly intensified by digital transformation...

    Raghu Raman, Aditya Kumar Sahu, ... Prema Nedungadi in Multimedia Tools and Applications
    Article 11 June 2024
  5. Information Security, Privacy and Digital Forensics Select Proceedings of the International Conference, ICISPD 2022

    This volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022)....

    Sankita J. Patel, Naveen Kumar Chaudhary, ... S. S. Iyengar in Lecture Notes in Electrical Engineering
    Conference proceedings 2024
  6. Towards adding digital forensics capabilities in software defined networking based moving target defense

    Moving Target Defense (MTD) is a security technique for Software Defined Networks (SDN) to change the attack surface constantly. Although MTD is an...

    Muhammad Faraz Hyder, Tasbiha Fatima, Saadia Arshad in Cluster Computing
    Article 24 March 2023
  7. An MSDCNN-LSTM framework for video frame deletion forensics

    Frame deletion detection is a challenging task in the field of digital video forensics. This paper proposes a deep-learning-based frame deletion...

    Chunhui Feng, Dawei Wu, ... Lifang Wei in Multimedia Tools and Applications
    Article 12 February 2024
  8. Incident Response

    Turning away from law enforcement, computer forensics is a common part of modern-day incident responseIncident response. Incident responseIncident...
    Joakim Kävrestad, Marcus Birath, Nathan Clarke in Fundamentals of Digital Forensics
    Chapter 2024
  9. Computer and Network Forensics

    This chapter discusses what constitutes digital evidence, the collection and analysis of digital evidence, the chain of custodyChain of custody, the...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  10. Categorizing Tracing Techniques for Network Forensics

    The traceback problem is widely acknowledged as one of the most challenging issues in the field of information security, and it is crucial to find...
    Shraddha Chourasiya, Ayush Indurkar, ... Dikshant Gaikwad in Cyber Security and Digital Forensics
    Conference paper 2024
  11. DQNANFCT: design of a deep Q-learning network for augmented network forensics via integrated contextual trust operations

    Network forensics helps analyze pre-emptive attacks and identify attackers using temporal behavior patterns. Most deep learning methods to design...

    Ashutosh Kumar Choudhary, Surendra Rahamatkar, Suniti Purbey in International Journal of Information Technology
    Article 13 June 2023
  12. Forensics Concepts

    Naseer Zehra zehra.naseer@Vanderbilt.Edu
    Chuck Easttom, William Butler, ... Zehra Naseer in Windows Forensics
    Chapter 2024
  13. Extractions of Forensics Data with Wireshark

    In this chapter, we will look at the challenges of obtaining forensics evidence from network capture files. First, we need to explain some basic...
    Kevin Cardwell in Tactical Wireshark
    Chapter 2023
  14. Data Hiding in Anti-forensics—Exploit Delivery Through Digital Steganography

    Developments in digital forensics investigations have occurred along with those in anti-forensics. Legal issues involving cybercrime are difficult to...
    Hans Gashi, Shahrzad Zargari, Setareh Jalali Ghazaani in Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs
    Conference paper 2024
  15. Microsoft Azure and Cloud Forensics

    Chuck Easttom, Ph.D., D.Sc.
    Chuck Easttom, William Butler, ... Zehra Naseer in Windows Forensics
    Chapter 2024
  16. Assessing Current and Emerging Challenges in the Field of Digital Forensics

    This paper critically assesses the current and emerging challenges encountered in the field of Digital Forensics (DF) with reference to Cloud...
    Chapter 2023
  17. Copy–move forgery detection in digital image forensics: A survey

    The detection of copy-move forgeries has been of utmost relevance in the field of digital image forensics because of the explosive growth of image...

    Mahmoud H. Farhan, Khalid Shaker, Sufyan Al-Janabi in Multimedia Tools and Applications
    Article 07 February 2024
  18. Digital Detectives: A Serious Point-and-Click Game for Digital Forensics

    As cyberattacks increase yearly, the ongoing scarcity of cybersecurity professionals and lack of knowledge about digital forensics (DF) are...
    Sabrina Friedl, Tobias Reittinger, Günther Pernul in Information Security Education - Challenges in the Digital Age
    Conference paper 2024
  19. Windows Memory Forensics

    Ramya Sai Bhagavatula
    Chuck Easttom, William Butler, ... Zehra Naseer in Windows Forensics
    Chapter 2024
  20. Memory Forensics for Artefacts Recovery from Ether Transactions

    Use of cryptocurrencies in crimes like money laundering, ransomware, narcotics trade and terror funding has been on increase. There is a disturbing...
    Borase Bhushan Gulabrao, Digvijaysinh Rathod, Aishwarya Tiwari in Information Security, Privacy and Digital Forensics
    Conference paper 2024
Did you find what you were looking for? Share feedback.