نتایج جستجو برای: forensics

تعداد نتایج: 3917  

2014
William R. Simpson Coimbatore Chandersekaran

Forensics is undertaken to find out exactly what happened on a computing system and who or what was responsible for it. This is done by a structured investigation while maintaining a documented chain of evidence. Cloud computing is emerging as an attractive, cost effective computing paradigm. The early offerings of cloud capabilities have not provided security, monitoring or attribution that wo...

Journal: :JCM 2013
Qassim Nasir Zahraa A. Al-Mousa

risks as attacks are increasing day after day. Network forensics is the process of investigation such attacks through analyzing network data and events. Many challenges are facing investigators due to the rapid growing of network scale and intruders’ skills. Honeypots are computer traps that are meant to be compromised to attract hackers and monitor their strategies and tools. Using honeypots p...

2012
Smita M. Nirkhi

Data mining is part of the interdisciplinary field of knowledge discovery in databases. Research on data mining began in the 1980s and grew rapidly in the 1990s.Specific techniques that have been developed within disciplines such as artificial intelligence, machine learning and pattern recognition have been successfully employed in data mining. Data mining has been successfully introduced in ma...

Journal: :Digital Investigation 2006
Sundararaman Jeyaraman Mikhail J. Atallah

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive ...

2011
José Benlliure K. Mayer M. Wallenius K. Lützenkirchen J. Galy N. Trautmann K. Fifield

Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material". Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that ar...

Journal: :IJDCF 2013
Benjamin Aziz Clive Blackwell Shareeful Islam

Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the ...

2012
Aleksandar Valjarevic Hein S. Venter

The importance of digital forensics is on a steady rise. One of the biggest challenges posed to digital forensics is the identity challenge. The authors define the identity challenge as the difficulty to prove beyond reasonable doubt in a court of law that a specific person was using a specific identity of a digital subject at a certain time. In order to meet or at least decrease this challenge...

Journal: :International Journal of Computer Applications 2015

Journal: :International Journal of Current Engineering and Technology 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید