全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Cinthya Grajeda , Laura Sanchez , Ibrahim Baggili ...
来源:[J].Digital Investigation(IF 0.63), 2018, Vol.26, pp.S47-S58
摘要:Abstract(#br)While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. ...
作者:Juhyun Park , Yun-Hwan Jang , Yongsu Park
来源:[J].Digital Investigation(IF 0.63), 2018, Vol.25, pp.42-54
摘要:Abstract(#br)Since criminals are committing offenses using smartphones in many cases, smartphone forensic techniques are being considered important by criminal investigators. In this paper, we present a new methodology to analyze firmware update protocols using fuzz testing. This...
作者:Hiba Al-Kawaz , Nathan Clarke , Steven Furnell ...
来源:[J].Digital Investigation(IF 0.63), 2018, Vol.26, pp.S136-S136
摘要:Abstract(#br)Facial recognition has played an essential role in digital forensics due to the widespread use of digital technology such as CCTV, mobile phones, and digital cameras. Therefore, the growing volume of multimedia files (photos and videos), in particular, are a val...
来源:[J].Digital Investigation(IF 0.63), 2017, Vol.20, pp.i-i
作者:Aya Fukami , Saugata Ghose , Yixin Luo ...
来源:[J].Digital Investigation(IF 0.63), 2017, Vol.20, pp.S1-S11
摘要:Abstract(#br)Digital forensic investigators often need to extract data from a seized device that contains NAND flash memory. Many such devices are physically damaged, preventing investigators from using automated techniques to extract the data stored within the device. Instead, i...
作者:Sebastian Nemetz , Sven Schmitt , Felix Freiling
来源:[J].Digital Investigation(IF 0.63), 2018, Vol.24, pp.S121-S130
摘要:Abstract(#br)An increasing number of programs like browsers or smartphone apps are using SQLite3 databases to store application data. In many cases, such data is of high value during a forensic investigation. Therefore, various tools have been developed that claim to support rigo...
作者:Jacques Boucher , Nhien-An Le-Khac
来源:[J].Digital Investigation(IF 0.63), 2018, Vol.24, pp.S68-S75
摘要:Abstract(#br)Today, application developers strive to make a user's experience seamless as they move from one device to the next by synchronizing the user's data between the devices. With the ever-increasing proliferation of Internet connected devices we can expect to see greater ...
作者:William J. Buchanan , Simone Chiale , Richard Macfarlane
来源:[J].Digital Investigation(IF 0.63), 2017, Vol.23, pp.88-98
摘要:Abstract(#br)This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo-localize the malware distribution over three main regions: China; Europe; and Russia. It provides a comprehensive review of existing academic literature about security in Andro...
作者:Yan Wu , Anthony Luo , Dianxiang Xu
来源:[J].Digital Investigation(IF 0.63), 2019, Vol.31
摘要:Abstract(#br)Bitcoin as a popular digital currency has been a target of theft and other illegal activities. Key to the forensic investigation is to identify bitcoin addresses involved in the bitcoin transfers. This paper presents a framework, FABT, for forensic analysis of b...
作者:Adam Bridge
来源:[J].Digital Investigation(IF 0.63), 2017
摘要:Abstract(#br)The Windows Common Controls is a library which facilitates the construction of GUI controls commonly used by Windows applications. Each control is an extension of the basic ‘window’ class. The difference in the extension results in one control over another; for ...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×