FADE : A forensic image generator for android device education
暂无分享,去创建一个
George Grispos | Kim‐Kwang Raymond Choo | Alberto A. Ceballos Delgado | William B. Glisson | K. Choo | W. Glisson | George Grispos
[1] Tim Storer,et al. Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization , 2013, ECIS.
[3] Kim-Kwang Raymond Choo,et al. LinkedLegal: Investigating social media as evidence in courtrooms , 2020, Comput. Law Secur. Rev..
[4] Richard P. Ayers,et al. Guidelines on Mobile Device Forensics , 2014 .
[5] William Bradley Glisson,et al. Investigating the Impact of Global Positioning System Evidence , 2015, 2015 48th Hawaii International Conference on System Sciences.
[6] Xiaoyu Du,et al. TraceGen: User activity emulation for digital forensic test image generation , 2020, Forensic Science International: Digital Investigation.
[7] Kim-Kwang Raymond Choo,et al. Cloud forecasting: Legal visibility issues in saturated environments , 2018, Comput. Law Secur. Rev..
[8] Christos Mousas,et al. A Virtual Reality Framework for Training Incident First Responders and Digital Forensic Investigators , 2019, ISVC.
[9] Tim Storer,et al. A comparison of forensic evidence recovery techniques for a windows mobile smart phone , 2011, Digit. Investig..
[10] Tim Storer,et al. Security Incident Response Criteria: A Practitioner's Perspective , 2015, AMCIS.
[11] Reiner Creutzburg,et al. Conception of a course for professional training and education in the field of computer and mobile forensics , 2012, Other Conferences.
[12] Martin Steinebach,et al. Data Corpora for Digital Forensics Education and Research , 2014, IFIP Int. Conf. Digital Forensics.
[13] Edita Bajramović. Challenges In Mobile Forensics Technology, Methodology, Training, And Expense , 2014 .
[14] Tim Storer,et al. Recovering residual forensic data from smartphone interactions with cloud storage providers , 2015, The Cloud Security Ecosystem.
[15] William Bradley Glisson,et al. Investigating the Increase in Mobile Phone Evidence in Criminal Activities , 2013, 2013 46th Hawaii International Conference on System Sciences.
[16] Tim Storer,et al. Electronic retention: what does your mobile phone reveal about you? , 2011, International Journal of Information Security.
[17] Georgios Kambourakis,et al. A critical review of 7 years of Mobile Device Forensics , 2013, Digit. Investig..
[18] Simson L. Garfinkel,et al. Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus , 2012, Digit. Investig..
[19] Simson L. Garfinkel,et al. Bringing science to digital forensics with standardized forensic corpora , 2009, Digit. Investig..
[20] Maria Papadaki,et al. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers , 2012, Secur. Commun. Networks.
[21] Richard P. Mislan. Creating laboratories for undergraduate courses in mobile phone forensics , 2010, SIGITE '10.
[22] Reiner Creutzburg,et al. Conception of a Master Course for IT and Media Forensics Part II: Android Forensics , 2015, 2015 Ninth International Conference on IT Security Incident Management & IT Forensics.