Sciweavers

561 search results - page 5 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
COMPSEC
2011
14 years 4 months ago
Designing a cluster-based covert channel to evade disk investigation and forensics
Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan ...
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
15 years 3 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
JCP
2007
132views more  JCP 2007»
14 years 9 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
89
Voted
DIMVA
2006
14 years 11 months ago
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime recons...
André Årnes, Paul Haas, Giovanni Vign...