Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser
暂无分享,去创建一个
[1] Muhammad Asif Khan,et al. Review of Live Forensic Analysis Techniques , 2015 .
[2] Vineet Richariya,et al. Implementing a Web Browser with Phishing Detection Techniques , 2011, ArXiv.
[3] Mohsen Guizani,et al. A lightweight live memory forensic approach based on hardware virtualization , 2017, Information Sciences.
[4] Marcus K. Rogers,et al. Computer Forensics Field Triage Process Model , 2006, J. Digit. Forensics Secur. Law.
[5] Nagoor Meeran. Forensic Evidence Collection by Reconstruction of Artifacts in Portable Web Browser , 2014 .
[6] Tim Wedge,et al. The Basics of Digital Forensics , 2012, Comput. Secur..
[7] Gabriela Limon Garcia,et al. Forensic physical memory analysis : an overview of tools and techniques , 2007 .
[8] Esther D. Adautin,et al. Forensic Reconstruction and Analysis of Residual Artifacts from Portable Web Browser , 2015 .
[9] Sangjin Lee,et al. Advanced evidence collection and analysis of web browser activity , 2011, Digit. Investig..
[10] NINKI HERMADUANTI. AUTOMATION FRAMEWORK FOR ROGUE ACCESS POINT MITIGATION IN IEEE 802.1X-BASED WLAN , 2016 .
[11] Wei Li. Anti-forensic digital investigation for unauthorized intrusion on a wireless network , 2013 .
[12] Sangjin Lee,et al. Analysis Framework to Detect Artifacts of Portable Web Browser , 2012, ITCS.
[13] Noureddine Boudriga,et al. A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks , 2012, IEEE Transactions on Information Forensics and Security.
[14] Dan Boneh,et al. An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.
[15] Robert Jones. Internet Forensics , 2005 .