نتایج جستجو برای: forensics
تعداد نتایج: 3917 فیلتر نتایج به سال:
Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals’ uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the email forensics. This paper elucidates the process of identifying such anti-forensics applied in...
background : the word death has been brought in several verses of quran. the purpose of this study is to discuss and compare similarities and differences between quran’s and forensics’ perspective in terms of death. methods: the present study is carried out by library studies on multiple interpretations of quran, interpretation of juridical references and comparing them with current forensics k...
With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Forensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical networ...
The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Network forensics is a new approach for the incident investigation and emergence response, which also enhance the network security from a different point of view. However, the current network forensics system is confused with...
Corporates and organizations across the globe are spending huge sums on information security as they are reporting an increase in security related incidents. The proliferation of cloud, social network and multiple mobile device usage is on one side represent an opportunity and benefits to the organisation and on other side have posed new challenges for those policing cybercrimes. Cybercriminals...
Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day's workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the...
Mobile device forensics is a subdivision of traditional digital forensics to recover digital evidence or data from a mobile device including smart phones and tablets. With a recent proliferation of smart phones, the demand of mobile device forensics is expected to be increased considerably. This paper explores currently available techniques and resources needed for mobile device forensics and p...
We propose, in this paper, a new ontology for network forensics analysis. The proposed ontology is the first cyber forensics to integrate both network forensics domain knowledge and problem solving knowledge. As such it can be used as a knowledge-base for developing sophisticated intelligent network forensics systems to support complex chain of reasoning. We use a real life network intrusion sc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید