نتایج جستجو برای: Forensics

تعداد نتایج: 3917  

2013
Sridhar Neralla

Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals’ uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the email forensics. This paper elucidates the process of identifying such anti-forensics applied in...

Journal: :international journal of medical toxicology and forensic medicine 0
b mostafazadeh department of forensic medicine and toxicology, shahid beheshti university of medical sciences, tehran f najari department of forensic medicine and toxicology, shahid beheshti university of medical sciences, tehran i baradaran kial department of forensic medicine and toxicology, shahid beheshti university of medical sciences, tehran

background : the word death has been brought in several verses of quran. the purpose of this study is to discuss and compare similarities and differences between quran’s and forensics’ perspective in terms of death. methods: the present study is carried out by library studies on multiple interpretations of quran, interpretation of juridical references and comparing them with current forensics k...

2013
Hu Jingfang Li Busheng

With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Forensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical networ...

2004
Wei Ren

The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Network forensics is a new approach for the incident investigation and emergence response, which also enhance the network security from a different point of view. However, the current network forensics system is confused with...

2014
Anamika Joshi

Corporates and organizations across the globe are spending huge sums on information security as they are reporting an increase in security related incidents. The proliferation of cloud, social network and multiple mobile device usage is on one side represent an opportunity and benefits to the organisation and on other side have posed new challenges for those policing cybercrimes. Cybercriminals...

2011
Elfadil Sabeil Azizah Bt Abdul Manaf Zuraini Ismail Mohamed Abas

Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day's workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the...

Journal: :The Iowa Review 2013

2017
Shaun Franks Myungjae Kwak

Mobile device forensics is a subdivision of traditional digital forensics to recover digital evidence or data from a mobile device including smart phones and tablets. With a recent proliferation of smart phones, the demand of mobile device forensics is expected to be increased considerably. This paper explores currently available techniques and resources needed for mobile device forensics and p...

2010
Sherif Saad Issa Traoré

We propose, in this paper, a new ontology for network forensics analysis. The proposed ontology is the first cyber forensics to integrate both network forensics domain knowledge and problem solving knowledge. As such it can be used as a knowledge-base for developing sophisticated intelligent network forensics systems to support complex chain of reasoning. We use a real life network intrusion sc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید