Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness
暂无分享,去创建一个
Youngmoon Lee | Faheem Khan | M. S. Anwar | Sathishkumar Murugesan | Ehtisham Ul Haque | W. Abbasi | Muhammad Shahid Anwar
[1] Y. Soh,et al. Performance Error Estimation and Elastic Integral Event Triggering Mechanism Design for T–S Fuzzy Networked Control System Under DoS Attacks , 2023, IEEE Transactions on Fuzzy Systems.
[2] S. Zhong,et al. Quantized Sampled-Data Control Tactic for T-S Fuzzy NCS Under Stochastic Cyber-Attacks and Its Application to Truck-Trailer System , 2022, IEEE Transactions on Vehicular Technology.
[3] From few to many: main trends in the internationalization of business R&D , 2022, Transnational Corporations.
[4] Y. Ali,et al. Analysing role of businesses’ investment in digital literacy: A case of Pakistan , 2022, Technological Forecasting and Social Change.
[5] R. A. Ramadhan,et al. Digital Forensic Investigation for Non-Volatile Memory Architecture by Hybrid Evaluation Based on ISO/IEC 27037:2012 and NIST SP800-86 Framework , 2022, IT Journal Research and Development.
[6] V. Basdeo,et al. The Need for Harmonised and Specialised Global Legislation to Address the Growing Spectre of Cybercrime , 2022, Southern African Public Law.
[7] Nina Sunde,et al. Unboxing the digital forensic investigation process. , 2022, Science & justice : journal of the Forensic Science Society.
[8] Waqas Ahmad,et al. Critical Analysis of Cybercrimes in Pakistan: Legislative Measures and Reforms , 2022, International Journal of Business and Economic Affairs.
[9] Kaukab Jamal Zuberi. The Attacks on the Critical Infrastructure of Pakistan , 2021, International Journal for Electronic Crime Investigation.
[10] S. Kazmi,et al. Growing Digital Vulnerability: A Case Study of Threats to Pakistans National Assets , 2021, 2021 International Conference on Communication Technologies (ComTech).
[11] Zarina Ilduzovna Khisamova,et al. Investigation and Seizure of Electronic Media in the Production of Investigative Actions , 2021, Law, State and Telecommunications Review.
[12] Marco Bolpagni. Cyber risk index: a socio-technical composite index for assessing risk of cyber attacks with negative outcome , 2021, Quality & Quantity.
[13] Amjad M. Hussain,et al. Studying the Causes of Delay in Criminal Trials under the Criminal Justice System of Pakistan , 2021, Global Sociological Review.
[14] Naghma Afridi. The Current Status of Forensic Science and its Impact on Administration of Criminal Justice System in Pakistan: An Analytical Study , 2021 .
[15] K. Shaukat,et al. Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective , 2020, 2020 International Conference on Cyber Warfare and Security (ICCWS).
[16] Jonathan Lusthaus. Cybercrime in Southeast Asia , 2020 .
[17] T. Qureshi,et al. A Study of Economic, Cultural, and Political Causes of Police Corruption in Pakistan , 2020, Policing: A Journal of Policy and Practice.
[18] Paul Reedy,et al. Interpol review of digital evidence 2016 - 2019 , 2020, Forensic science international. Synergy.
[19] F. N. Koranteng,et al. Impact of Cybercrime and Trust on the Use of E-Commerce Technologies: An Application of the Theory of Planned Behavior , 2020 .
[20] T. Rehman. International Cooperation and Legal Response to Cybercrime in Pakistan , 2020 .
[21] M. Ayub,et al. CYBER-WARFARE: IMPLICATIONS FOR THE NATIONAL SECURITY OF PAKISTAN , 2020 .
[22] Kim-Kwang Raymond Choo,et al. Categorization and Organization of Database Forensic Investigation Processes , 2020, IEEE Access.
[23] Encyclopedia of Criminal Activities and the Deep Web , 2020 .
[24] Jose de Arimatéia da Cruz. The Legislative Framework of the European Union (EU) Convention on Cybercrime , 2019, The Palgrave Handbook of International Cybercrime and Cyberdeviance.
[25] L. Chang. Legislative Frameworks Against Cybercrime: The Budapest Convention and Asia , 2019, The Palgrave Handbook of International Cybercrime and Cyberdeviance.
[26] Asma Tariq,et al. Crime scene investigation in Pakistan: A perspective , 2019, Forensic Science International.
[27] Pardis Moslemzadeh Tehrani,et al. Impact of PECA-2016 Provisions on Freedom of Speech: A Case of Pakistan , 2019, Journal of Management Info.
[28] Kim-Kwang Raymond Choo,et al. On the importance of standardising the process of generating digital forensic reports , 2019, Forensic Science International: Reports.
[29] Richard Hill,et al. Next-Generation Digital Forensics: Challenges and Future Paradigms , 2019, 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3).
[30] R. Montasari,et al. A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics , 2019, Int. J. Electron. Secur. Digit. Forensics.
[31] Qamar Atta Ul Haq,et al. Cyber Security and Analysis of Cyber-Crime Laws to Restrict Cyber Crime in Pakistan , 2019, International Journal of Computer Network and Information Security.
[32] C. McCartney,et al. The UK forensic science regulator: A model for forensic science regulation? , 2018 .
[33] Oludare Isaac Abiodun,et al. Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence , 2018, J. Inf. Process. Syst..
[34] Francis Kwabena Boachie. ICT Infrastructure Required For Sustainable Library Services In The 21St Century Issues And Challenges From A Developing Country's Perspective , 2018, 2018 5th International Symposium on Emerging Trends and Technologies in Libraries and Information Services (ETTLIS).
[35] A. Basit,et al. Democratization in Pakistan: Role of Media in Civilian and Military Regimes , 2017 .
[36] S. Cordner,et al. Humanitarian forensic action - Its origins and future. , 2017, Forensic science international.
[37] G. Tully. Forensic science and forensic pathology: Quality standards and risks , 2017, The Medico-legal journal.
[38] Kamran Shaukat,et al. A Socio-Technological analysis of Cyber Crime and Cyber Security in Pakistan , 2017 .
[39] J. Robertson. Forensic science – it’s bigger than you think! , 2016 .
[40] Javier Poncela,et al. Research in Pakistan: Structure, Funding and Results , 2016 .
[41] Eva A. Vincze,et al. Challenges in Digital Forensics , 2017 .
[42] Reza Montasari,et al. A comprehensive digital forensic investigation process model , 2016, Int. J. Electron. Secur. Digit. Forensics.
[43] Michael Trucano. SABER-ICT framework paper for policy analysis : documenting national educational technology policies around the world and their evolution over time , 2016 .
[44] Sultan Ullah,et al. Pakistan and cyber crimes: Problems and preventions , 2015, 2015 First International Conference on Anti-Cybercrime (ICACC).
[45] Elaine B. Barker,et al. A Profile for U. S. Federal Cryptographic Key Management Systems , 2015 .
[46] Aleksandar Valjarevic,et al. A Comprehensive and Harmonized Digital Forensic Investigation Process Model , 2015, Journal of forensic sciences.
[47] Adam Sedgewick,et al. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0 , 2014 .
[48] Valerie Hobbs,et al. The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice , 2013, J. Digit. Forensics Secur. Law.
[49] Halil Ibrahim Bulbul,et al. Digital forensics: an analytical crime scene procedure model (ACSPM). , 2013, Forensic science international.
[50] Paula Thomas,et al. An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines , 2011, Digit. Investig..
[51] Ankit Agarwal,et al. Systematic Digital Forensic Investigation Model , 2011 .
[52] David Preston,et al. A New Approach of Digital Forensic Model for Digital Forensic Investigation , 2011 .
[53] A. Kershaw. Professional standards, public protection and the administration of justice , 2009 .
[54] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[55] Alexander B. Downes. Desperate Times, Desperate Measures: The Causes of Civilian Victimization in War , 2006, International Security.
[56] Venansius Baryamureeba,et al. The Enhanced Digital Investigation Process Model , 2004 .
[57] Seamus O. Ciardhuáin,et al. An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..
[58] Brian D. Carrier,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[59] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[60] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .