共 50 条
- [1] Network Forensics Investigation for Botnet Attack IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 228 - 236
- [2] An Approach to Detect Network Attacks Applied for Network Forensics 2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 655 - 660
- [3] Memory Forensics Analysis for Investigation of Online Crime - A Review PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 40 - 45
- [4] Linux Memory Forensics: Expanding Rekall for Userland Investigation 2018 11TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT & IT FORENSICS (IMF 2018), 2018, : 27 - 46
- [5] A New Approach in Digital Forensics Investigation Process 2018 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2018, : 270 - 275
- [6] A Unified Forensics Analysis Approach to Digital Investigation PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 466 - 475
- [7] Network Security Approach for Digital Forensics Analysis ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
- [8] A Graded Approach to Network Forensics with Privacy Concerns 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 292 - 297
- [9] Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 217 - 230
- [10] Disk Memory Forensics Analysis of Memory Forensics Frameworks Flow 2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,