Academic literature on the topic 'Digital forensics ; Visualisation ; Computer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital forensics ; Visualisation ; Computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital forensics ; Visualisation ; Computer security"

1

Srinivasan, S. "Digital Forensics Curriculum in Security Education." Journal of Information Technology Education: Innovations in Practice 12 (2013): 147–57. http://dx.doi.org/10.28945/1857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haggerty, John, Sheryllynne Haggerty, and Mark Taylor. "Forensic triage of email network narratives through visualisation." Information Management & Computer Security 22, no. 4 (2014): 358–70. http://dx.doi.org/10.1108/imcs-11-2013-0080.

Full text
Abstract:
Purpose – The purpose of this paper is to propose a novel approach that automates the visualisation of both quantitative data (the network) and qualitative data (the content) within emails to aid the triage of evidence during a forensics investigation. Email remains a key source of evidence during a digital investigation, and a forensics examiner may be required to triage and analyse large email data sets for evidence. Current practice utilises tools and techniques that require a manual trawl through such data, which is a time-consuming process. Design/methodology/approach – This paper applies
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Hu. "Dilemmas in Digital Forensics for Computer Equipment Security and Maintenance in Remote Ships." Advanced Materials Research 490-495 (March 2012): 1382–86. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.1382.

Full text
Abstract:
As remote ships have equipped a large number of computer equipments, the maintenance of such equipments confronts a great challenge. Since some embedded devices among them may be hacked by attackers or disabled by Byzantine failure, to discover the attacking originality and fault source present foremost importance. In this article, we discuss digital investigation and forensics as a general viewpoint. We point out some dilemmas that hinder the development of digital forensics, some of which may be fundamental problems. We propose to expand the concept of digital forensics to a wider scope so a
APA, Harvard, Vancouver, ISO, and other styles
4

Kara, Ilker. "Read the digital fingerprints: log analysis for digital forensics and security." Computer Fraud & Security 2021, no. 7 (2021): 11–16. http://dx.doi.org/10.1016/s1361-3723(21)00074-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Park, Jong Hyuk, Stefanos Gritzalis, Hai Jin, and Jenlong Wang. "Network security and digital forensics in next generation communications." Wireless Communications and Mobile Computing 11, no. 2 (2011): 143–45. http://dx.doi.org/10.1002/wcm.1091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Faiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.

Full text
Abstract:
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of
APA, Harvard, Vancouver, ISO, and other styles
7

Yadav, Priya R. "Review Paper on Introduction to Cyber Forensics." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (2021): 1939–42. http://dx.doi.org/10.22214/ijraset.2021.37684.

Full text
Abstract:
Abstract: Cyber Forensics is termed as scientific methods or applications in association with the judiciary or court of laws. The aim behind these methods is to unveil the digital evidence to be utilized in court for solving crime cases. This sort of technology wasn’t practiced before therefore most criminals tend to urge away with their criminal acts without valid proof to incriminate or prosecute them. During that time the oaths, confessions, testimonies from witnesses were the sole determining factors of evidence Crimes committed within electronic or digital domains, particularly within cyb
APA, Harvard, Vancouver, ISO, and other styles
8

Kazemi, Seyyed Sajjad, and Sajjad Heidari. "Digital forensics and its role in promoting criminal prosecution." Revista Eletrônica em Gestão, Educação e Tecnologia Ambiental 25 (March 22, 2021): e5. http://dx.doi.org/10.5902/2236117063798.

Full text
Abstract:
Digital forensics is essentially synonymous with computer forensics, but the term "digital forensics" is generally used for the technical review of all devices that have the ability to store data. Today, digital criminology is challenged in cloud computing. The first problem is to understand why and how criminal and social actions are so unique and complex. The second problem is the lack of accurate scientific tools for forensic medicine in cyberspace. So far, no complete tools or explanations for criminology have been provided in the virtual infrastructure, and no training for security resear
APA, Harvard, Vancouver, ISO, and other styles
9

Serketzis, Nikolaos, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, and George J. Pangalos. "Actionable threat intelligence for digital forensics readiness." Information & Computer Security 27, no. 2 (2019): 273–91. http://dx.doi.org/10.1108/ics-09-2018-0110.

Full text
Abstract:
PurposeThe purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of cyber threat information sharing.Design/methodology/approachThis paper uses a quantitative methodology to identify the most popular cyber threat intelligence (CTI) elements and introduces a lightweight approach to correlate those with potential forensic value, resulting in the quick and accurate triaging and identification of patterns of malicious activities.FindingsWhile threat intelligence exchange steadily becom
APA, Harvard, Vancouver, ISO, and other styles
10

Zawoad, Shams, Marjan Mernik, and Ragib Hasan. "Towards building a forensics aware language for secure logging." Computer Science and Information Systems 11, no. 4 (2014): 1291–314. http://dx.doi.org/10.2298/csis131201051z.

Full text
Abstract:
Trustworthy system logs and application logs are crucial for digital forensics. Researchers have proposed different security mechanisms to ensure the integrity and confidentiality of logs. However, applying current secure logging schemes on heterogeneous formats of logs is tedious. Here, we propose Forensics Aware Language (FAL), a domain-specific language (DSL) through which we can apply a secure logging mechanism on any format of logs. Using FAL, we can define log structure, which represents the format of logs and ensures the security properties of a chosen secure logging scheme. This log st
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Digital forensics ; Visualisation ; Computer security"

1

Hales, Gavin. "Assisting digital forensic analysis via exploratory information visualisation." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113.

Full text
Abstract:
Background: Digital forensics is a rapidly expanding field, due to the continuing advances in computer technology and increases in data stage capabilities of devices. However, the tools supporting digital forensics investigations have not kept pace with this evolution, often leaving the investigator to analyse large volumes of textual data and rely heavily on their own intuition and experience. Aim: This research proposes that given the ability of information visualisation to provide an end user with an intuitive way to rapidly analyse large volumes of complex data, such approached could be ap
APA, Harvard, Vancouver, ISO, and other styles
2

Fei, Bennie Kar Leung. "Data visualisation in digital forensics." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-03072007-153241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sylve, Joseph T. "Android Memory Capture and Applications for Security and Privacy." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1400.

Full text
Abstract:
The Android operating system is quickly becoming the most popular platform for mobiledevices. As Android’s use increases, so does the need for both forensic and privacy toolsdesigned for the platform. This thesis presents the first methodology and toolset for acquiringfull physical memory images from Android devices, a proposed methodology for forensicallysecuring both volatile and non-volatile storage, and details of a vulnerability discovered by theauthor that allows the bypass of the Android security model and enables applications to acquirearbitrary permissions.
APA, Harvard, Vancouver, ISO, and other styles
4

AlMarri, Saeed. "A structured approach to malware detection and analysis in digital forensics investigation." Thesis, University of Bedfordshire, 2017. http://hdl.handle.net/10547/622529.

Full text
Abstract:
Within the World Wide Web (WWW), malware is considered one of the most serious threats to system security with complex system issues caused by malware and spam. Networks and systems can be accessed and compromised by various types of malware, such as viruses, worms, Trojans, botnet and rootkits, which compromise systems through coordinated attacks. Malware often uses anti-forensic techniques to avoid detection and investigation. Moreover, the results of investigating such attacks are often ineffective and can create barriers for obtaining clear evidence due to the lack of sufficient tools and
APA, Harvard, Vancouver, ISO, and other styles
5

Årnes, Andre. "Risk, Privacy, and Security in Computer Networks." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1725.

Full text
Abstract:
<p>With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network monitoring, incident management, and digital forensics is of increasing importance with the escalation of cybercrime and other network supported serious crimes. New laws and regulations governing electronic communications, cybercrime, and data retention are being proposed, continuously requiring new methods and tools.</p><p>This thesis introduces a novel approach to real-time network risk assessment based on hidden Markov models to represent the likelihood of transitions between security states
APA, Harvard, Vancouver, ISO, and other styles
6

Karresand, Martin. "Completing the Picture : Fragments and Back Again." Licentiate thesis, Linköping : Department of Computer and Information Science, Linköpings universitet, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Johnson, William. "Development of Peer Instruction Material for a Cybersecurity Curriculum." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2367.

Full text
Abstract:
Cybersecurity classes focus on building practical skills alongside the development of the open mindset that is essential to tackle the dynamic cybersecurity landscape. Unfortunately, traditional lecture-style teaching is insufficient for this task. Peer instruction is a non-traditional, active learning approach that has proven to be effective in computer science courses. The challenge in adopting peer instruction is the development of conceptual questions. This thesis presents a methodology for developing peer instruction questions for cybersecurity courses, consisting of four stages: concept
APA, Harvard, Vancouver, ISO, and other styles
8

Henriksson, Jonas. "Automated Cross-Border Mutual Legal Assistance in Digital Forensics (AUTOMLA) : A global realized Enterprise Architecture." Thesis, Högskolan i Halmstad, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44824.

Full text
Abstract:
Organized cybercrime has no borders in cyberspace. This paper suggests a state-of-the-art architected solution for a global Automated cross-border mutual legal assistance system within Digital Forensic (AUTOMLA). The Enterprise framework with technical viewpoint enables international collaboration between sovereign countries Fusion Centers. The evaluation concludes a user interface built in React, middleware Apollo with schema support linked to graph database Neo4j. GraphQL is the preferred application protocol over REST. Fusion Centers API is deployed as federated gateways, and business funct
APA, Harvard, Vancouver, ISO, and other styles
9

gorbov, sergey. "Practical Application of Fast Disk Analysis for Selective Data Acquisition." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2230.

Full text
Abstract:
Using a forensic imager to produce a copy of the storage is a common practice. Due to the large volumes of the modern disks, the imaging may impose severe time overhead which ultimately delays the investigation process. We proposed automated disk analysis techniques that precisely identify regions on the disk that contain data. We also developed a high performance imager that produces AFFv3 images at rates exceeding 300MB/s. Using multiple disk analysis strategies we can analyze a disk within a few minutes and yet reduce the imaging time of by many hours. Partial AFFv3 images produced by our i
APA, Harvard, Vancouver, ISO, and other styles
10

Rakitianskaia, A. S. (Anastassia Sergeevna). "Digital Forensics in Second Life." Diss., 2015. http://hdl.handle.net/2263/44263.

Full text
Abstract:
Computers and the internet have become an integral part of our lives. People have grown accustomed to feeling constantly connected to the outside world, and in the past couple of decades online social networks and three-dimensional online virtual worlds have gained great popularity. In addition to social connections, virtual worlds (such as Second Life, a popular virtual world) offer their users opportunities for both work and play, and let them take part in things that might have been impossible in real life. However, the human factor plays a big role in the formation of the virtual com
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Digital forensics ; Visualisation ; Computer security"

1

Digital forensics for handheld devices. CRC Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Richard, Bejtlich, and Rose Curtis W, eds. Real digital forensics: Computer security and incident response. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wiles, Jack. Techno security's guide to e-discovery and digital forensics. Syngress Publishing, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wiles, Jack. Techno security's guide to e-discovery and digital forensics. Syngress Publishing, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eoghan, Casey, and Aquilina James M, eds. Malware forensics field guide for Windows systems: Digital forensics field guides. Syngress, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gregory, Kipper, and ScienceDirect (Online service), eds. Virtualization and forensics: A digital forensic investigator's guide to virtual environments. Syngress/Elsevier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schperberg, Robert. Cybercrime: Incident response and digital forensics. Information Systems Audit and Control Association, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Windows registry forensics: Advanced digital forensic analysis of the Windows registry. Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International Workshop on Digital Forensics and Incident Analysis (2nd 2007 Karlovassi, Samos, Greece). Digital forensics and incident analysis: Second International annual Workshop on Digital Forensics and Incident Analysis : proceedings : WDFIA 2007 : 27-28 August, 2007, Karlovassi, Samos, Greece. IEEE Computer Society, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Digital forensics for network, Internet, and cloud computing: A forensic evidence guide for moving targets and data. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Digital forensics ; Visualisation ; Computer security"

1

Petrović, Slobodan. "Approximate Search in Digital Forensics." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abdelazim, Mohamed T., Nashwa Abdelbaki, and Ahmed F. Shosha. "Experimental Digital Forensics of Subscriber Identification Module (SIM) Card." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

R., Parkavi, Anitha S., and Gayathri R. "Digital Steganography Security." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1558-7.ch009.

Full text
Abstract:
Steganography has been considered as a major instrument used for an unauthorized and destructive purpose such as crime and warfare, and forensics has been used for a constructive purpose such as crime detection and fraud detection. Hence, the combination of both steganography and forensics plays a major role in the present internet era for information exchange between two parties. It has been propelled to the forefront of the current security techniques. The main objective of the technique is to provide an imperceptible way of transferring secret messages to the recipient. Another issue to be noted is that the term steganography completely differs from cryptography. The above-stated analysis is used in digital forensics. There are many steganography software tools available for ordinary computer users.
APA, Harvard, Vancouver, ISO, and other styles
4

"What a Computer Security Professional Needs to Know about E-Discovery and Digital Forensics." In Information Security Management Handbook. CRC Press, 2007. http://dx.doi.org/10.1201/9781439833032-237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maybury, Mark T. "Toward Principles of Cyberspace Security." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8456-0.ch001.

Full text
Abstract:
Increasing global dependence on cyberspace, rapidly and continuously changing technology, sustained vulnerabilities, and advanced persistent threats are driving an increasing societal risk of attack in cyberspace. Assuring a broad range of infrastructure critical for a well-functioning society is essential in a broad range of areas including but not limited to communications, transportation, and commerce. Based on an engagement with government, industry, and academia, and building upon prior research in computer security principles, this chapter articulates a set of enduring cybersecurity principles that can serve as a focusing framework to improve trust and assurance of systems considering requirements, architecture and design, and operations and maintenance. This chapter first outlines the threat and its consequence, describes prior research in cybersecurity principles, and then outlines a set of succinct and actionable cybersecurity principles.
APA, Harvard, Vancouver, ISO, and other styles
6

Leibrock, Larry. "What a Computer Security Professional Needs to Know about E-Discovery and Digital Forensics." In Information Security Management Handbook, Sixth Edition. CRC Press, 2007. http://dx.doi.org/10.1201/9781439833032.ch223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"What a Computer Security Professional Needs To Know about E-Discovery and Digital Forensics." In Information Security Management Handbook, Volume 3. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420003406-53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

RajaKumaran, Gayathri, and NeelaNarayanan Venkataraman. "A Systematic Mapping of Security Mechanisms." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch013.

Full text
Abstract:
In the Internet Era, millions of computer systems are connected to the Internet and the number is increasing infinitely. Maintaining proper Control and configuration for all such networked systems has proved to be impossible. This loophole makes the Internet systems vulnerable to various type of attacks. The objective of this research is to systematically identify a wide list of attacks in transport, session and application layers (Host layers). 148 effective controls are identified for the security attacks in addition to the 113 standard controls. The identified controls are analyzed in order to map and categorize them to the corresponding security layers wise.
APA, Harvard, Vancouver, ISO, and other styles
9

Fachkha, Claude. "Security Monitoring of the Cyber Space." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8456-0.ch004.

Full text
Abstract:
Adversaries are abusing Internet security and privacy services to execute cyber attacks. To cope with these threats, network operators utilize various security tools and techniques to monitor the cyber space. An efficient way to infer Internet threat activities is to collect information from trap-based monitoring sensors. As such, this chapter primarily defines the cyberspace trap-based monitoring systems and their taxonomies. Moreover, it presents the state-of-the-art in terms of research contributions and techniques, tools and technologies. Furthermore, it identifies gaps in terms of science and technology. Additionally, it presents some case studies and practical approaches corresponding to large-scale cyber monitoring systems such as Nicter. We further present some related security policies and legal issues for network monitoring. This chapter provides an overview on Internet monitoring and offers a guideline for readers to help them understand the concepts of observing, detecting and analyzing cyber attacks through computer network traps.
APA, Harvard, Vancouver, ISO, and other styles
10

Puslecki, Pawel T. "Biometrical Processing of Faces in Security and Forensics." In Handbook of Research on Computational Forensics, Digital Crime, and Investigation. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-836-9.ch004.

Full text
Abstract:
The aim of this chapter is the overall and comprehensive description of the machine face processing issue and presentation of its usefulness in security and forensic applications. The chapter overviews the methods of face processing as the field deriving from various disciplines. After a brief introduction to the field, the conclusions concerning human processing of faces that have been drawn by the psychology researchers and neuroscientists are described. Then the most important tasks related to the computer facial processing are shown: face detection, face recognition and processing of facial features, and the main strategies as well as the methods applied in the related fields are presented. Finally, the applications of digital biometrical processing of human faces are presented.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital forensics ; Visualisation ; Computer security"

1

Osborne, Grant, and Benjamin Turnbull. "Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Osborne, Grant, and Jill Slay. "Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Osborne, Grant, Benjamin Turnbull, and Jill Slay. "The "Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation." In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Herath, A., S. Herath, P. Samarasinghe, J. Herath, and Susantha Herath. "Computer forensics, information security and law: a case study." In First International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, 2005. http://dx.doi.org/10.1109/sadfe.2005.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!