Sciweavers

561 search results - page 4 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 3 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
AINA
2010
IEEE
15 years 2 months ago
InnoDB Database Forensics
— Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) ti...
Peter Fruhwirt, Marcus Huber, Martin Mulazzani, Ed...
ISSA
2008
14 years 11 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
SAC
2010
ACM
15 years 4 months ago
e-mail authorship verification for forensic investigation
Farkhund Iqbal, Liaquat A. Khan, Benjamin C. M. Fu...