Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
KELIHOS BOTNET: A NEVER-ENDING SAGA
Arora, Arsh, Gannon, Max, Warner, Gary
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Journal Article
DIGITAL FORENSICS TOOL SELECTION WITH MULTI-ARMED BANDIT PROBLEM
Karabiyik, Umit, Karabiyik, Tugba
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Journal Article
EXPLORING DIGITAL EVIDENCE WITH GRAPH THEORY
Palmer, Imani, Campbell, Roy, Gelfand, Boris
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Journal Article
FAST FILTERING OF KNOWN PNG FILES USING EARLY FILE FEATURES
McKeown, Sean, Russell, Gordon, Leimich, Petra
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Journal Article
DETECTING DECEPTION IN ASYNCHRONOUS TEXT
Glancy, Fletcher H
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Journal Article
SOURCE ANONYMIZATION OF DIGITAL IMAGES: A COUNTER–FORENSIC ATTACK ON PRNU BASED SOURCE IDENTIFICATION TECHNIQUES
Sengupta, Prithviraj, Sameer, Venkata Udaya, Naskar, Ruchira, Kalaimannan, Ezhil
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Journal Article
DEFINING A CYBER JURISPRUDENCE
Stephenson, Peter R
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2017)
Journal Article
APPLYING GROUNDED THEORY METHODS TO DIGITAL FORENSICS RESEARCH
Almarzooqi, Ahmed, Jones, Andrew, Howley, Richard
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2016)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2016)
Journal Article
FORENSIC ANALYSIS OF ARES GALAXY PEER-TO-PEER NETWORK
Kolenbrander, Frank, Le-Khac, Nhien-An, Kechadi, M-Tahar
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2016)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2016)
Journal Article
FORENSICS ANALYSIS OF PRIVACY OF PORTABLE WEB BROWSERS
Ghafarian, Ahmad
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2016)
Get full text
Published in Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2016)
Journal Article