Forensic investigation framework for cryptocurrency wallet in the end device
暂无分享,去创建一个
[1] Doowon Jeong,et al. A reference database of Windows artifacts for file‐wiping tool execution analysis , 2023, Journal of forensic sciences.
[2] W. Buchanan,et al. A framework for live host-based Bitcoin wallet forensics and triage , 2023, Forensic Sci. Int. Digit. Investig..
[3] Mohammad Meraj Mirza,et al. Mobile Cyber Forensic Investigations of Web3 Wallets on Android and iOS , 2022, Applied Sciences.
[4] Yanyan Zhuang,et al. Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files , 2022, 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC).
[5] Cheman Shaik. Securing Cryptocurrency Wallet Seed Phrase Digitally with Blind Key Encryption , 2020, International Journal on Cryptography and Information Security.
[6] Saru Kumari,et al. Supervised learning model for identifying illegal activities in Bitcoin , 2020, Appl. Intell..
[7] Nickson M. Karie,et al. Cursory View of IoT-Forensic Readiness Framework Based on ISO/IEC 27043 Recommendations , 2020, International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020).
[8] Tyler Thomas,et al. Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets - A Tool and Visualization Framework , 2020, Digit. Investig..
[9] Nhien-An Le-Khac,et al. Forensic analysis of privacy-oriented cryptocurrencies , 2020, Digit. Investig..
[10] Kim-Kwang Raymond Choo,et al. An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems , 2019, IEEE Access.
[11] Kristopher McKay Duffin,et al. The use of cryptocurrencies in the money laundering process , 2019, Journal of Money Laundering Control.
[12] Md. Mahin,et al. Digital Forensic Investigation Framework for Internet of Things (IoT): A Comprehensive Approach , 2019, 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT).
[13] Kim-Kwang Raymond Choo,et al. Cracking Bitcoin wallets: I want what you have in the wallets , 2019, Future Gener. Comput. Syst..
[14] Kim-Kwang Raymond Choo,et al. Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core , 2017, IEEE Access.
[15] Ranko Petrović,et al. ISO/IEC 27043:2015 — Role and application , 2016, 2016 24th Telecommunications Forum (TELFOR).
[16] Indrakshi Ray,et al. A Generic Digital Forensic Investigation Framework for Internet of Things (IoT) , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[17] James Caverlee,et al. The Deep Web and the Darknet: A Look Inside the Internet's Massive Black Box , 2015 .
[18] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[19] Narasimha Shashidhar,et al. Digital Forensic Analysis on Prefetch Files , 2015 .
[20] Upasna Singh,et al. Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability , 2018, Comput. Secur..
[21] Daniel Davis Wood. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .