Zobrazeno 1 - 10
of 93
pro vyhledávání: '"digital forensic process"'
Autor:
Shaweta Sachdeva, Aleem Ali
Publikováno v:
International Journal of System Assurance Engineering and Management. 13:156-165
In this paper, various Distributed Denial of service attacks like Internet Control Message Protocol Attack, Transmission Control Protocol Sync Attack, and User Datagram Protocol Attack were considered for data classification. With digital forensics,
Publikováno v:
Journal of KIISE. 48:865-870
Autor:
Puneet Sharma
Publikováno v:
International Journal of Advanced Trends in Computer Science and Engineering. 9:6477-6484
Publikováno v:
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control. :155-160
Information technology has become an essential thing in the digital era as it is today. With the support of computer networks, information technology is used as a medium for exchanging data and information. Much information is confidential. Therefore
Publikováno v:
IEEE Internet of Things Journal. 7:1-15
Internet of Things (IoT) is increasingly permeating peoples’ lives, gradually revolutionizing our way of life. Due to the tight connection between people and IoT, now civil and criminal investigations or internal probes must take IoT into account.
Autor:
Siljac, Stjepan
The area of digital forensics might be old but the idea that criminals or other organisations are actively working to hide their steps is somewhat new. Roughly a year ago, a company announced that they can actively exploit security flaws in a popular
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-92511
Autor:
Kohn, Michael Donovan
The Information and Communications Technology (ICT) environment constitutes an integral part of our daily lives. Individual computer users and large corporate companies are increasingly dependent on services provided by ICT. These services range from
Externí odkaz:
http://hdl.handle.net/2263/25433
http://upetd.up.ac.za/thesis/available/etd-06102013-160956/
http://upetd.up.ac.za/thesis/available/etd-06102013-160956/
Publikováno v:
Electronics (Basel) (2021). doi:10.3390/electronics10111229
info:cnr-pdr/source/autori:Prakash, V., Williams, A., Garg, L., Savaglio, C., Bawa, S./titolo:Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems/doi:10.3390%2Felectronics10111229/rivista:Electronics (Basel)/anno:2021/pagina_da:/pagina_a:/intervallo_pagine:/volume
Electronics, Vol 10, Iss 1229, p 1229 (2021)
info:cnr-pdr/source/autori:Prakash, V., Williams, A., Garg, L., Savaglio, C., Bawa, S./titolo:Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems/doi:10.3390%2Felectronics10111229/rivista:Electronics (Basel)/anno:2021/pagina_da:/pagina_a:/intervallo_pagine:/volume
Electronics, Vol 10, Iss 1229, p 1229 (2021)
In recent years, there has been a dramatic change in attitude towards computers and the use of computer resources in general. Cloud and Edge computing have emerged as the most widely used technologies, including fog computing and the Internet of Thin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b7a0829f3cb9224f9f569a515a3e13d5
https://www.mdpi.com/2079-9292/10/11/1229
https://www.mdpi.com/2079-9292/10/11/1229
Publikováno v:
Advances in Security, Networks, and Internet of Things ISBN: 9783030710163
Based on the elasticity, virtualization, volatility, multi-tenancy, and multi-jurisdiction characteristics of IoT environments, implementation of conventional digital forensic process models to security incidents is challenging. To address the challe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::371c43495b8310a6f9831df4c679a620
https://doi.org/10.1007/978-3-030-71017-0_25
https://doi.org/10.1007/978-3-030-71017-0_25
Publikováno v:
2020 International Conference on Computational Intelligence (ICCI).
the implementation of Secure FI process by digitally by adapting the IoT based connecting many wireless smart devices may expose security vulnerabilities. The DF related to IoT based can be characterized as a field of study however ought to be utiliz