Cyber Forensics Tools: A Review on Mechanism and Emerging Challenges
暂无分享,去创建一个
[1] Matt Bishop,et al. Investigating the Implications of Virtual Machine Introspection for Digital Forensics , 2009, 2009 International Conference on Availability, Reliability and Security.
[2] K. K. Arthur. An Investigation Into Computer Forensic Tools , 2004, ISSA.
[3] K. Inman,et al. Principles and Practice of Criminalistics: The Profession of Forensic Science , 2000 .
[4] Pedro Ramos Brandao. Forensics and Digital Criminal Investigation Challenges in Cloud Computing and Virtualization , 2019 .
[5] Minglu Li,et al. An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds , 2010, IEEE Security & Privacy.
[6] Mahesh Shirole,et al. Comparative analysis of commercial and open source mobile device forensic tools , 2016, 2016 Ninth International Conference on Contemporary Computing (IC3).
[7] Kathryn C. Seigfried-Spellar,et al. File Toolkit for Selective Analysis & Reconstruction (FileTSAR) for Large-Scale Networks , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[8] Ebru Celikel Cankaya,et al. A survey of digital forensics tools for database extraction , 2016, 2016 Future Technologies Conference (FTC).
[9] Alexandru Vulpe,et al. Mobile devices forensic platform for malware detection , 2019 .
[10] Xiaohua Feng,et al. Challenges in ROS Forensics , 2019, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[11] Shahrzad Zargari,et al. Cloud Forensics: Concepts, Issues, and Challenges , 2012, 2012 Third International Conference on Emerging Intelligent Data and Web Technologies.
[12] Michael N. Johnstone,et al. Seven Pitfalls of Using Data Science in Cybersecurity , 2020, Data Science in Cybersecurity and Cyberthreat Intelligence.
[13] Tobias Eggendorfer,et al. Challenges of Network Forensic Investigation in Virtual Networks , 2016, J. Cyber Secur. Mobil..
[14] Mohsen Guizani,et al. Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges , 2016, IEEE Network.
[15] Silvia Uribe Mayoral,et al. Recommendation techniques in forensic data analysis: a new approach , 2015 .
[16] Sherali Zeadally,et al. Mobile Forensics: Advances, Challenges, and Research Opportunities , 2017, IEEE Security & Privacy.
[17] B. B. Meshram,et al. Digital Forensics and Cyber Crime Datamining , 2012, J. Information Security.
[18] Song Wang,et al. Security and Forensics in the Internet of Things: Research Advances and Challenges , 2020, 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT).
[19] Ali Dehghantanha,et al. Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study , 2018, IEEE Transactions on Sustainable Computing.
[20] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[21] Eoghan Casey,et al. Handbook of Computer Crime Investigation: Forensic Tools and Technology , 2001 .
[22] Amjad Zareen,et al. Notice of Violation of IEEE Publication PrinciplesMobile Phone Forensics: Challenges, Analysis and Tools Classification , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[23] Steven J. Vaughan-Nichols,et al. New Approach to Virtualization Is a Lightweight , 2006, Computer.
[24] Josh Jones,et al. Analysis of digital forensics live system acquisition methods to achieve optimal evidence preservation , 2016, SoutheastCon 2016.