A survey on privacy impacts of digital investigation
暂无分享,去创建一个
Ali Dehghantanha | Nur Izura Udzir | Solahuddin Shamsuddin | Farid Daryabar | Nor Fazlida Mohd Sani | Farhood Norouzizadeh | N. F. M. Sani | A. Dehghantanha | N. Udzir | S. Shamsuddin | Farid Daryabar | Farhood Norouzizadeh
[1] Tim McGuire,et al. Using the DC3 forensic challenge as a basis for a special topics digital forensics upper level undergraduate course , 2008 .
[2] Jeroen Keppens,et al. Compositional Bayesian modelling for computation of evidence collection strategies , 2011, Applied Intelligence.
[3] Matthias Kirschner,et al. Detecting Suspicious Relational Database Queries , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[4] Shen Wang,et al. Hiding traces of double compression in JPEG images based on Tabu Search , 2012, Neural Computing and Applications.
[5] Dario V. Forte. Advances in Onion Routing: Description and backtracing/investigation problems , 2006, Digit. Investig..
[6] Muddassar Farooq,et al. ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables , 2011, Knowledge and Information Systems.
[7] Hein S. Venter,et al. A Forensic Framework for Handling Information Privacy Incidents , 2009, IFIP Int. Conf. Digital Forensics.
[8] Michail Vlachos,et al. Real-time creation of bitmap indexes on streaming network data , 2011, The VLDB Journal.
[9] E. A. Edirisinghe,et al. Real-time automatic license plate recognition for CCTV forensic applications , 2013, Journal of Real-Time Image Processing.
[10] Sangjin Lee,et al. A study on multimedia file carving method , 2011, Multimedia Tools and Applications.
[11] Tim Storer,et al. Electronic retention: what does your mobile phone reveal about you? , 2011, International Journal of Information Security.
[12] Ali Dehghantanha,et al. A survey about impacts of cloud computing on digital forensics , 2013 .
[13] Martin S. Olivier,et al. Sequenced release of privacy-accurate information in a forensic investigation , 2010, Digit. Investig..
[14] Ali Dehghantanha,et al. Framework of digital forensics for the Samsung Star Series phone , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[15] Charles W. Adams. Legal Issues Pertaining to the Development of Digital Forensic Tools , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.
[16] Huwida Said,et al. Forensic analysis of private browsing artifacts , 2011, 2011 International Conference on Innovations in Information Technology.
[17] Ali Dehghantanha,et al. A review on impacts of cloud computing and digital forensics , 2014 .
[18] Markus Jakobsson,et al. Cryptographic Approaches to Provacy in Forensic DNA Databases , 2000, Public Key Cryptography.
[19] Dimitris Geneiatakis,et al. PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies , 2006, Communications and Multimedia Security.
[20] José R. Agustina,et al. Challenges before crime in a digital era: Outsmarting cybercrime offenders - Workshop on Cybercrime, Computer Crime Prevention and the Surveillance Society , 2011, Comput. Law Secur. Rev..
[21] Gerome Miklau,et al. Threats to privacy in the forensic analysis of database systems , 2007, SIGMOD '07.
[22] Ali Dehghantanha,et al. Greening Digital Forensics: Opportunities and Challenges , 2011, SPIT/IPC.
[23] Ali Dehghantanha,et al. Defusing the Hazards of Social Network Services , 2011 .
[24] J. Doug Tygar,et al. Privacy in Sensor Webs and Distributed Information Systems , 2002, ISSS.
[25] Claudio Soriente,et al. Security and privacy issues in the Portable Document Format , 2010, J. Syst. Softw..
[26] Sangjin Lee,et al. A recovery method of deleted record for SQLite database , 2011, Personal and Ubiquitous Computing.
[27] Ali Dehghantanha,et al. Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems , 2011, CISIS.
[28] Ankush Mittal,et al. OS-Guard: on-site signature based framework for multimedia surveillance data management , 2010, Multimedia Tools and Applications.
[29] Jedidiah R. Crandall,et al. Privacy-preserving network flow recording , 2011 .
[30] Ali Dehghantanha. Xml-Based Privacy Model in Pervasive Computing , 2008 .
[31] Ali Dehghantanha,et al. User-centered Privacy and Trust Model in Cloud Computing Systems , 2009 .
[32] Emilio Ferrara,et al. Forensic analysis of phone call networks , 2012, Social Network Analysis and Mining.
[33] Ali Dehghantanha,et al. A User-Centered Context-Sensitive Privacy Model in Pervasive Systems , 2010, 2010 Second International Conference on Communication Software and Networks.
[34] Michail Vlachos,et al. Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic , 2010, Proc. VLDB Endow..
[35] Siu-Ming Yiu,et al. Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[36] Martin Boldt,et al. Analysing Countermeasures Against Privacy-Invasive Software , 2006, 2006 International Conference on Software Engineering Advances (ICSEA'06).
[37] Ahmad-Reza Sadeghi,et al. A Forensic Framework for Tracing Phishers , 2007, FIDIS.
[38] Siu-Ming Yiu,et al. Protecting Digital Data Privacy in Computer Forensic Examination , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[39] Ali Dehghantanha,et al. Forensics investigation challenges in cloud computing environments , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[40] Ying Zhu,et al. Attack Pattern Discovery in Forensic Investigation of Network Attacks , 2011, IEEE Journal on Selected Areas in Communications.
[41] Hae-Yeoun Lee,et al. Color laser printer forensic based on noisy feature and support vector machine classifier , 2013, Multimedia Tools and Applications.
[42] Ramlan Mahmoud,et al. Digital forensics trends and future , 2013 .
[43] Yong-Rak Choi,et al. A study on block-based recovery of damaged digital forensic evidence image , 2011, Multimedia Tools and Applications.
[44] Ali Dehghantanha,et al. UPM: User-Centered Privacy Model in Pervasive Computing Systems , 2009, 2009 International Conference on Future Computer and Communication.