Sciweavers

741 search results - page 5 / 149
» Tools and techniques for Network Forensics
Sort
View
JCP
2007
132views more  JCP 2007»
13 years 7 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
CMS
2006
110views Communications» more  CMS 2006»
13 years 9 months ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...
IJDE
2007
384views more  IJDE 2007»
13 years 7 months ago
Computer Forensic Analysis in a Virtual Environment
In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and softwa...
Derek Bem, Ewa Huebner
DI
2007
39views more  DI 2007»
13 years 7 months ago
Advanced carving techniques
“Carving” is the term most often used to indicate the act of recovering a file from unstructured digital forensic  images. The term unstructured  indic...
M. I. Cohen
IEEEARES
2009
IEEE
14 years 2 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop