Read the digital fingerprints: log analysis for digital forensics and security

被引:0
|
作者
Kara, Ilker [1 ]
机构
[1] Karatekin University, Turkey
来源
Computer Fraud and Security | 2021年 / 2021卷 / 07期
关键词
D O I
10.1016/S1361-3723(21)00074-9
中图分类号
学科分类号
摘要
24
引用
收藏
页码:11 / 16
相关论文
共 50 条
  • [2] Investigating digital fingerprints: Advanced log analysis
    Knight, Eric
    [J]. Network Security, 2010, 2010 (10) : 17 - 20
  • [3] Network Security Approach for Digital Forensics Analysis
    Achi, H.
    Hellany, A.
    Nagrial, M.
    [J]. ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
  • [4] Digital Forensics Security Analysis on iOS Devices
    Wu, Min-Hao
    Chang, Ting-Cheng
    Yi Li-Min
    [J]. JOURNAL OF WEB ENGINEERING, 2021, 20 (03): : 775 - 793
  • [5] Digital image forensics via intrinsic fingerprints
    Swaminathan, Ashwin
    Wu, Min
    Liu, K. J. Ray
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 101 - 117
  • [6] An Ontology for Digital Security and Digital Forensics Investigative Techniques
    Ellison, Dagney
    Venter, Hein
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 119 - 127
  • [7] An ontology for digital security and digital forensics investigative techniques
    University of Pretoria, Pretoria, South Africa
    [J]. Proc. Int. Conf. Cyber Warf. Secur., ICCWS, 1600, (119-127):
  • [8] Distributed Log System in Cloud Digital Forensics
    Jiang, Ci-Bin
    Liu, I-Hsien
    Chen, Yi-Chen
    Li, Jung-Shian
    Liu, Chuan-Gang
    [J]. 2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 258 - 263
  • [9] Digital Forensics Curriculum in Security Education
    Srinivasan, S.
    [J]. JOURNAL OF INFORMATION TECHNOLOGY EDUCATION-INNOVATIONS IN PRACTICE, 2013, 12 : 147 - 157
  • [10] Digital Image Source Coder Forensics Via Intrinsic Fingerprints
    Lin, W. Sabrina
    Tjoa, Steven K.
    Zhao, H. Vicky
    Liu, K. J. Ray
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 460 - 475