Zobrazeno 1 - 10
of 1 124
pro vyhledávání: '"File system fragmentation"'
Publikováno v:
Forensic Science International: Digital Investigation, 38:301125. Elsevier Advanced Technology
van der Meer, V, Jonker, H L & van den Bos, J 2021, ' A Contemporary Investigation of NTFS File Fragmentation ', Forensic Science International: Digital Investigation, vol. 38, 301125 . https://doi.org/10.1016/j.fsidi.2021.301125
Forensic Science International, 38, Supplement, pp. 1-11
Forensic Science International, 38, 1-11
van der Meer, V, Jonker, H L & van den Bos, J 2021, ' A Contemporary Investigation of NTFS File Fragmentation ', Forensic Science International: Digital Investigation, vol. 38, 301125 . https://doi.org/10.1016/j.fsidi.2021.301125
Forensic Science International, 38, Supplement, pp. 1-11
Forensic Science International, 38, 1-11
There is a significant amount of research in digital forensics into analyzing file fragments or reconstructing fragmented data. At the same time, there are no recent measurements of fragmentation on current, in-use computer systems. To close this gap
Autor:
Jianchen Shan, Cristian Borcea, Narain Gehani, Reza Curtmola, Xiaoning Ding, Nafize R. Paiker
Publikováno v:
IEEE Transactions on Cloud Computing. 8:97-111
With cloud assistance, mobile apps can offload their resource-demanding computation tasks to the cloud. This leads to a scenario where computation tasks in the same program run concurrently on both the mobile device and the cloud. An important challe
Autor:
Young Ik Eom, Jonggyu Park
Publikováno v:
SOSP
File fragmentation has been widely studied for several decades because it negatively influences various I/O activities. To eliminate fragmentation, most defragmentation tools migrate the entire content of files into a new area. Unfortunately, such me
Autor:
Sangwook Shane Hahn, Cheng Ji, Riwei Pan, Sungjin Lee, Jihong Kim, Liang Shi, Li-Pin Chang, Chun Jason Xue
Publikováno v:
IEEE Transactions on Mobile Computing. 18:2062-2076
Mobile devices, such as smartphones, have become a necessity in our daily life. However, users may notice that after being used for a long time, mobile devices begin to exhibit a sluggish response. Based on an empirical study on a collection of aged
Autor:
N. Ramya, S. Abdul Saleem
Publikováno v:
Asian Journal of Computer Science and Technology. 8:46-51
Cloud computing is an emerging patterning that provides computing, communication and storage resources-as-service over a network. In existing system, data stored in a cloud is unsafe due to the eaves dropping and hacking process. To overcome the draw
Publikováno v:
SoCC
Key-value stores are increasingly adopting LSM-trees as their enabling data structure in the backend block storage, and persisting their clustered data through a block manager, usually a file system. In general, a file system is expected to not only
Autor:
Abdullatif Saleh Alfaqiri, Ahmed Nour Moussa, Firas Layth Khaleel, Mohammed Abdulaziz Alsubhi
Publikováno v:
2020 International Conference on Computing and Information Technology (ICCIT-1441).
Collection and analysis of data are at the heart of digital forensics. However, in real-life situations, the data of interest is often found in files that were partially erased or otherwise tampered with. Consequently, identification of the file type
Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0294c1770fb4363bb0df61f38710f431
https://zenodo.org/record/4070255
https://zenodo.org/record/4070255
Publikováno v:
DATE
As we all know, file and free space fragmentation negatively affect file system performance. F2FS is a file system designed for flash memory. However, it suffers from severe fragmentation due to its out-of-place updates and the highly synchronous, mu
Autor:
Vincent van der Meer, Harm van Beek, Hugo Jonker, Guy Dols, Jeroen van den Bos, Marko van Eekelen
Publikováno v:
WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December, pp. 1-6
2019 IEEE International Workshop on Information Forensics and Security (WIFS): Proceedings, 1-6
STARTPAGE=1;ENDPAGE=6;TITLE=2019 IEEE International Workshop on Information Forensics and Security (WIFS)
WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December, 1-6. Los Alamitos : IEEE
STARTPAGE=1;ENDPAGE=6;TITLE=WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December
van der Meer, V, Jonker, H, Dols, G, van Beek, H, van den Bos, J & van Eekelen, M 2020, File Fragmentation in the Wild : A Privacy-Friendly Approach . in 2019 IEEE International Workshop on Information Forensics and Security (WIFS) : Proceedings . IEEE, Delft, pp. 1-6, 2019 IEEE International Workshop on Information Forensics and Security, Delft, Netherlands, 9/12/19 . https://doi.org/10.1109/WIFS47025.2019.9034981
WIFS
2019 IEEE International Workshop on Information Forensics and Security (WIFS): Proceedings, 1-6
STARTPAGE=1;ENDPAGE=6;TITLE=2019 IEEE International Workshop on Information Forensics and Security (WIFS)
WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December, 1-6. Los Alamitos : IEEE
STARTPAGE=1;ENDPAGE=6;TITLE=WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December
van der Meer, V, Jonker, H, Dols, G, van Beek, H, van den Bos, J & van Eekelen, M 2020, File Fragmentation in the Wild : A Privacy-Friendly Approach . in 2019 IEEE International Workshop on Information Forensics and Security (WIFS) : Proceedings . IEEE, Delft, pp. 1-6, 2019 IEEE International Workshop on Information Forensics and Security, Delft, Netherlands, 9/12/19 . https://doi.org/10.1109/WIFS47025.2019.9034981
WIFS
Digital forensic tooling should be based on reference data. Such reference data can be gathered by measuring a baseline, e.g. from volunteers. However, the privacy provisions in digital forensics tools are typically tailored for criminal investigatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6fd9c312e7c8f2690cb89a511b23b239
https://hdl.handle.net/2066/219343
https://hdl.handle.net/2066/219343