Academic literature on the topic 'Digital forensics ; Visualisation ; Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital forensics ; Visualisation ; Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Digital forensics ; Visualisation ; Computer security"
Srinivasan, S. "Digital Forensics Curriculum in Security Education." Journal of Information Technology Education: Innovations in Practice 12 (2013): 147–57. http://dx.doi.org/10.28945/1857.
Full textHaggerty, John, Sheryllynne Haggerty, and Mark Taylor. "Forensic triage of email network narratives through visualisation." Information Management & Computer Security 22, no. 4 (2014): 358–70. http://dx.doi.org/10.1108/imcs-11-2013-0080.
Full textChen, Hu. "Dilemmas in Digital Forensics for Computer Equipment Security and Maintenance in Remote Ships." Advanced Materials Research 490-495 (March 2012): 1382–86. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.1382.
Full textKara, Ilker. "Read the digital fingerprints: log analysis for digital forensics and security." Computer Fraud & Security 2021, no. 7 (2021): 11–16. http://dx.doi.org/10.1016/s1361-3723(21)00074-9.
Full textPark, Jong Hyuk, Stefanos Gritzalis, Hai Jin, and Jenlong Wang. "Network security and digital forensics in next generation communications." Wireless Communications and Mobile Computing 11, no. 2 (2011): 143–45. http://dx.doi.org/10.1002/wcm.1091.
Full textFaiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.
Full textYadav, Priya R. "Review Paper on Introduction to Cyber Forensics." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (2021): 1939–42. http://dx.doi.org/10.22214/ijraset.2021.37684.
Full textKazemi, Seyyed Sajjad, and Sajjad Heidari. "Digital forensics and its role in promoting criminal prosecution." Revista Eletrônica em Gestão, Educação e Tecnologia Ambiental 25 (March 22, 2021): e5. http://dx.doi.org/10.5902/2236117063798.
Full textSerketzis, Nikolaos, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, and George J. Pangalos. "Actionable threat intelligence for digital forensics readiness." Information & Computer Security 27, no. 2 (2019): 273–91. http://dx.doi.org/10.1108/ics-09-2018-0110.
Full textZawoad, Shams, Marjan Mernik, and Ragib Hasan. "Towards building a forensics aware language for secure logging." Computer Science and Information Systems 11, no. 4 (2014): 1291–314. http://dx.doi.org/10.2298/csis131201051z.
Full textDissertations / Theses on the topic "Digital forensics ; Visualisation ; Computer security"
Hales, Gavin. "Assisting digital forensic analysis via exploratory information visualisation." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113.
Full textFei, Bennie Kar Leung. "Data visualisation in digital forensics." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-03072007-153241.
Full textSylve, Joseph T. "Android Memory Capture and Applications for Security and Privacy." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1400.
Full textAlMarri, Saeed. "A structured approach to malware detection and analysis in digital forensics investigation." Thesis, University of Bedfordshire, 2017. http://hdl.handle.net/10547/622529.
Full textÅrnes, Andre. "Risk, Privacy, and Security in Computer Networks." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1725.
Full textKarresand, Martin. "Completing the Picture : Fragments and Back Again." Licentiate thesis, Linköping : Department of Computer and Information Science, Linköpings universitet, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11752.
Full textJohnson, William. "Development of Peer Instruction Material for a Cybersecurity Curriculum." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2367.
Full textHenriksson, Jonas. "Automated Cross-Border Mutual Legal Assistance in Digital Forensics (AUTOMLA) : A global realized Enterprise Architecture." Thesis, Högskolan i Halmstad, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44824.
Full textgorbov, sergey. "Practical Application of Fast Disk Analysis for Selective Data Acquisition." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2230.
Full textRakitianskaia, A. S. (Anastassia Sergeevna). "Digital Forensics in Second Life." Diss., 2015. http://hdl.handle.net/2263/44263.
Full textBooks on the topic "Digital forensics ; Visualisation ; Computer security"
Richard, Bejtlich, and Rose Curtis W, eds. Real digital forensics: Computer security and incident response. Addison-Wesley, 2005.
Find full textWiles, Jack. Techno security's guide to e-discovery and digital forensics. Syngress Publishing, 2007.
Find full textWiles, Jack. Techno security's guide to e-discovery and digital forensics. Syngress Publishing, 2007.
Find full textEoghan, Casey, and Aquilina James M, eds. Malware forensics field guide for Windows systems: Digital forensics field guides. Syngress, 2012.
Find full textGregory, Kipper, and ScienceDirect (Online service), eds. Virtualization and forensics: A digital forensic investigator's guide to virtual environments. Syngress/Elsevier, 2010.
Find full textSchperberg, Robert. Cybercrime: Incident response and digital forensics. Information Systems Audit and Control Association, 2005.
Find full textWindows registry forensics: Advanced digital forensic analysis of the Windows registry. Syngress, 2011.
Find full textInternational Workshop on Digital Forensics and Incident Analysis (2nd 2007 Karlovassi, Samos, Greece). Digital forensics and incident analysis: Second International annual Workshop on Digital Forensics and Incident Analysis : proceedings : WDFIA 2007 : 27-28 August, 2007, Karlovassi, Samos, Greece. IEEE Computer Society, 2007.
Find full textDigital forensics for network, Internet, and cloud computing: A forensic evidence guide for moving targets and data. Syngress, 2010.
Find full textBook chapters on the topic "Digital forensics ; Visualisation ; Computer security"
Petrović, Slobodan. "Approximate Search in Digital Forensics." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_20.
Full textAbdelazim, Mohamed T., Nashwa Abdelbaki, and Ahmed F. Shosha. "Experimental Digital Forensics of Subscriber Identification Module (SIM) Card." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_22.
Full textR., Parkavi, Anitha S., and Gayathri R. "Digital Steganography Security." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1558-7.ch009.
Full text"What a Computer Security Professional Needs to Know about E-Discovery and Digital Forensics." In Information Security Management Handbook. CRC Press, 2007. http://dx.doi.org/10.1201/9781439833032-237.
Full textMaybury, Mark T. "Toward Principles of Cyberspace Security." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8456-0.ch001.
Full textLeibrock, Larry. "What a Computer Security Professional Needs to Know about E-Discovery and Digital Forensics." In Information Security Management Handbook, Sixth Edition. CRC Press, 2007. http://dx.doi.org/10.1201/9781439833032.ch223.
Full text"What a Computer Security Professional Needs To Know about E-Discovery and Digital Forensics." In Information Security Management Handbook, Volume 3. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420003406-53.
Full textRajaKumaran, Gayathri, and NeelaNarayanan Venkataraman. "A Systematic Mapping of Security Mechanisms." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch013.
Full textFachkha, Claude. "Security Monitoring of the Cyber Space." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8456-0.ch004.
Full textPuslecki, Pawel T. "Biometrical Processing of Faces in Security and Forensics." In Handbook of Research on Computational Forensics, Digital Crime, and Investigation. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-836-9.ch004.
Full textConference papers on the topic "Digital forensics ; Visualisation ; Computer security"
Osborne, Grant, and Benjamin Turnbull. "Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.120.
Full textOsborne, Grant, and Jill Slay. "Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.36.
Full textOsborne, Grant, Benjamin Turnbull, and Jill Slay. "The "Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation." In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.74.
Full textHerath, A., S. Herath, P. Samarasinghe, J. Herath, and Susantha Herath. "Computer forensics, information security and law: a case study." In First International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, 2005. http://dx.doi.org/10.1109/sadfe.2005.7.
Full text