Journal articles on the topic 'Network forensic framework analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network forensic framework analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.
Full textHaggerty, John, Alexander J. Karran, David J. Lamb, and Mark Taylor. "A Framework for the Forensic Investigation of Unstructured Email Relationship Data." International Journal of Digital Crime and Forensics 3, no. 3 (July 2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.
Full textN, Karthikeyan, and Godwin Ponsam J. "Differentiation of Natural and Maliciously Induced Packet Loss in Wireless Network Using Forensic Analysis." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 354. http://dx.doi.org/10.14419/ijet.v7i4.6.28440.
Full textDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Full textChethana H. T. and Trisiladevi C. Nagavi. "A New Framework for Matching Forensic Composite Sketches With Digital Images." International Journal of Digital Crime and Forensics 13, no. 5 (September 2021): 1–19. http://dx.doi.org/10.4018/ijdcf.20210901.oa1.
Full textBijalwan, Anchit, Vijender Kumar Solanki, and Emmanuel Shubhakar Pilli. "BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES." Network Protocols and Algorithms 10, no. 2 (June 28, 2018): 28. http://dx.doi.org/10.5296/npa.v10i2.13144.
Full textKhan, Muhammad Naeem Ahmed. "Multi-agent Based Forensic Analysis Framework for Infrastructures Involving Storage Networks." Proceedings of the National Academy of Sciences, India Section A: Physical Sciences 89, no. 2 (March 14, 2018): 291–309. http://dx.doi.org/10.1007/s40010-017-0473-3.
Full textAnton Yudhana, Abdul Fadlil, and Muhammad Rizki Setyawan. "Analysis of Skype Digital Evidence Recovery based on Android Smartphones Using the NIST Framework." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 4 (August 17, 2020): 682–90. http://dx.doi.org/10.29207/resti.v4i4.2093.
Full textTurner, Adam B., Stephen McCombie, and Allon J. Uhlmann. "Discerning payment patterns in Bitcoin from ransomware attacks." Journal of Money Laundering Control 23, no. 3 (July 5, 2020): 545–89. http://dx.doi.org/10.1108/jmlc-02-2020-0012.
Full textReid, Shannon E. "Friendship Group Composition and Juvenile Institutional Misconduct." International Journal of Offender Therapy and Comparative Criminology 61, no. 2 (July 28, 2016): 191–209. http://dx.doi.org/10.1177/0306624x15589737.
Full textKim, Hyungchan, Sungbum Kim, Yeonghun Shin, Wooyeon Jo, Seokjun Lee, and Taeshik Shon. "Ext4 and XFS File System Forensic Framework Based on TSK." Electronics 10, no. 18 (September 20, 2021): 2310. http://dx.doi.org/10.3390/electronics10182310.
Full textTeunis, Peter, Janneke C. M. Heijne, Faizel Sukhrie, Jan van Eijkeren, Marion Koopmans, and Mirjam Kretzschmar. "Infectious disease transmission as a forensic problem: who infected whom?" Journal of The Royal Society Interface 10, no. 81 (April 6, 2013): 20120955. http://dx.doi.org/10.1098/rsif.2012.0955.
Full textBright, David, and Chad Whelan. "On the relationship between goals, membership and network design in multi-agency “fusion” centres." Policing: An International Journal 42, no. 3 (June 10, 2019): 441–54. http://dx.doi.org/10.1108/pijpsm-05-2018-0070.
Full textDemertzis, Konstantinos, Konstantinos Tsiknas, Dimitrios Takezis, Charalabos Skianis, and Lazaros Iliadis. "Darknet Traffic Big-Data Analysis and Network Management for Real-Time Automating of the Malicious Intent Detection Process by a Weight Agnostic Neural Networks Framework." Electronics 10, no. 7 (March 25, 2021): 781. http://dx.doi.org/10.3390/electronics10070781.
Full textAkremi, Aymen, Hassen Sallay, Mohsen Rouached, and Rafik Bouaziz. "Applying Digital Forensics to Service Oriented Architecture." International Journal of Web Services Research 17, no. 1 (January 2020): 17–42. http://dx.doi.org/10.4018/ijwsr.2020010102.
Full textShao, Chenghui, Qixun Zhang, Yang Song, and Dong Zhu. "Medical Information Forensics System Based on Convolutional Neural Network with Pattern Finding Prior." Journal of Medical Imaging and Health Informatics 10, no. 5 (May 1, 2020): 1098–104. http://dx.doi.org/10.1166/jmihi.2020.2893.
Full textAxenopoulos, Apostolos, Volker Eiselein, Antonio Penta, Eugenia Koblents, Ernesto La Mattina, and Petros Daras. "A Framework for Large-Scale Analysis of Video \"in the Wild\" to Assist Digital Forensic Examination." IEEE Security & Privacy 17, no. 1 (January 2019): 23–33. http://dx.doi.org/10.1109/msec.2018.2875851.
Full textZhang, Chongzhen, Yanli Chen, Yang Meng, Fangming Ruan, Runze Chen, Yidan Li, and Yaru Yang. "A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques." Security and Communication Networks 2021 (January 25, 2021): 1–15. http://dx.doi.org/10.1155/2021/6610675.
Full textKeim, Yansi, Yung Han Yoon, and Umit Karabiyik. "Digital Forensics Analysis of Ubuntu Touch on PinePhone." Electronics 10, no. 3 (February 1, 2021): 343. http://dx.doi.org/10.3390/electronics10030343.
Full textKaur, Sukhdilpreet, and Amandeep Verma. "Ontological Engineering Approach Towards Botnet Detection in Network Forensics." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 9 (September 15, 2013): 1990–2001. http://dx.doi.org/10.24297/ijct.v10i9.1390.
Full textEl Alaoui El Abdallaoui, Hasna, Abdelaziz El Fazziki, Fatima Zohra Ennaji, and Mohamed Sadgal. "An e-government crowdsourcing framework: suspect investigation and identification." International Journal of Web Information Systems 15, no. 4 (October 7, 2019): 432–53. http://dx.doi.org/10.1108/ijwis-11-2018-0079.
Full textDemertzis, Konstantinos, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez, and Lazaros Iliadis. "The Next Generation Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for Efficient Defense against Adversarial Attacks." Big Data and Cognitive Computing 3, no. 1 (January 10, 2019): 6. http://dx.doi.org/10.3390/bdcc3010006.
Full textDemertzis, Konstantinos, Panayiotis Kikiras, Nikos Tziritas, Salvador Sanchez, and Lazaros Iliadis. "The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence." Big Data and Cognitive Computing 2, no. 4 (November 22, 2018): 35. http://dx.doi.org/10.3390/bdcc2040035.
Full textPasko, Roman, and Svitlana Terenchuk. "THE USE OF NEURO-FUZZY MODELS IN EXPERT SUPPORT SYSTEMS FOR FORENSIC BUILDING-TECHNICAL EXPERTISE." ScienceRise 2 (April 30, 2020): 10–18. http://dx.doi.org/10.21303/2313-8416.2020.001278.
Full textCHEN, ZHONGQIANG, ALEX DELIS, and PETER WEI. "IDENTIFICATION AND MANAGEMENT OF SESSIONS GENERATED BY INSTANT MESSAGING AND PEER-TO-PEER SYSTEMS." International Journal of Cooperative Information Systems 17, no. 01 (March 2008): 1–51. http://dx.doi.org/10.1142/s0218843008001750.
Full textHubareva, V. M. "SOME SPECIFICS OF COST DETERMINING OF EQUIPMENT AND MACHINES TAKING INTO ACCOUNT QUALITY DEGRADATION DUE TO WEAR." Theory and Practice of Forensic Science and Criminalistics 18 (December 26, 2018): 498–504. http://dx.doi.org/10.32353/khrife.2018.57.
Full textLeukfeldt, E. R., and Thomas J. Holt. "Examining the Social Organization Practices of Cybercriminals in the Netherlands Online and Offline." International Journal of Offender Therapy and Comparative Criminology 64, no. 5 (December 27, 2019): 522–38. http://dx.doi.org/10.1177/0306624x19895886.
Full textCohen, M. I. "PyFlag – An advanced network forensic framework." Digital Investigation 5 (September 2008): S112—S120. http://dx.doi.org/10.1016/j.diin.2008.05.016.
Full textFerreira, Sara, Mário Antunes, and Manuel E. Correia. "A Dataset of Photos and Videos for Digital Forensics Analysis Using Machine Learning Processing." Data 6, no. 8 (August 5, 2021): 87. http://dx.doi.org/10.3390/data6080087.
Full textKhanuja, Harmeet Kaur. "A Framework for Database Forensic Analysis." Computer Science & Engineering: An International Journal 2, no. 3 (June 30, 2012): 27–41. http://dx.doi.org/10.5121/cseij.2012.2303.
Full textRahman, Mohammad Arifur, and Huzefa Rangwala. "IDMIL: an alignment-free Interpretable Deep Multiple Instance Learning (MIL) for predicting disease from whole-metagenomic data." Bioinformatics 36, Supplement_1 (July 1, 2020): i39—i47. http://dx.doi.org/10.1093/bioinformatics/btaa477.
Full textLIU, Dai-ping, Ming-wei ZHANG, and Jia CHEN. "Blood examination-based network traffic analysis framework." Journal of Computer Applications 28, no. 12 (February 26, 2009): 3220–23. http://dx.doi.org/10.3724/sp.j.1087.2008.03220.
Full textBoscolo, R., C. Sabatti, J. C. Liao, and V. P. Roychowdhury. "A Generalized Framework for Network Component Analysis." IEEE/ACM Transactions on Computational Biology and Bioinformatics 2, no. 4 (October 2005): 289–301. http://dx.doi.org/10.1109/tcbb.2005.47.
Full textFu, Zening, Yuhui Du, and Vince D. Calhoun. "The Dynamic Functional Network Connectivity Analysis Framework." Engineering 5, no. 2 (April 2019): 190–93. http://dx.doi.org/10.1016/j.eng.2018.10.001.
Full textZhang, Wen Xia, Yan Wang, and Shu Hua Li. "Analysis Framework of Freemodbus." Advanced Materials Research 765-767 (September 2013): 1610–13. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1610.
Full textNuttachot Promrit, Anirach Mingkhwan, Supaporn Simcharoen, and Nati Namvong. "Multi-Dimensional Visualization for Network Forensic Analysis." International Journal of Advancements in Computing Technology 4, no. 5 (March 15, 2012): 222–32. http://dx.doi.org/10.4156/ijact.vol4.issue5.27.
Full textPreszler, Jonathan, David K. Marcus, John F. Edens, and Barbara E. McDermott. "Network analysis of psychopathy in forensic patients." Journal of Abnormal Psychology 127, no. 2 (February 2018): 171–82. http://dx.doi.org/10.1037/abn0000325.
Full textZhang, Chuanchao, Jiguang Wang, Chao Zhang, Juan Liu, Dong Xu, and Luonan Chen. "Network stratification analysis for identifying function-specific network layers." Molecular BioSystems 12, no. 4 (2016): 1232–40. http://dx.doi.org/10.1039/c5mb00782h.
Full textLakhal, Salem, Alain Martel, Muhittin Oral, and Benoit Montreuil. "Network companies and competitiveness: A framework for analysis." European Journal of Operational Research 118, no. 2 (October 1999): 278–94. http://dx.doi.org/10.1016/s0377-2217(99)00026-0.
Full textMartínez, Víctor, Fernando Berzal, and Juan-Carlos Cubero. "NOESIS: A Framework for Complex Network Data Analysis." Complexity 2019 (October 31, 2019): 1–14. http://dx.doi.org/10.1155/2019/1439415.
Full textDalampira, Evropi‐Sofia, and Stefanos A. Nastis. "Mapping Sustainable Development Goals: A network analysis framework." Sustainable Development 28, no. 1 (July 2, 2019): 46–55. http://dx.doi.org/10.1002/sd.1964.
Full textKim, Hyun, Tae Kim, and Sang Lee. "Framework for network modularization and Bayesian network analysis to investigate the perturbed metabolic network." BMC Systems Biology 5, Suppl 2 (2011): S14. http://dx.doi.org/10.1186/1752-0509-5-s2-s14.
Full textHamdi, Sally Dakheel, and Abdulkareem Merhej Radhi. "Integrated Cyber Forensic for E-Mail Analysis Framework." Indian Journal of Science and Technology 12, no. 27 (July 1, 2019): 1–13. http://dx.doi.org/10.17485/ijst/2019/v12i27/145999.
Full textHadjidj, Rachid, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szporer, and Djamel Benredjem. "Towards an integrated e-mail forensic analysis framework." Digital Investigation 5, no. 3-4 (March 2009): 124–37. http://dx.doi.org/10.1016/j.diin.2009.01.004.
Full textArsić, Branko, Ljubiša Bojić, Ivan Milentijević, Petar Spalević, and Dejan Rančić. "SYMBOLS: SOFTWARE FOR SOCIAL NETWORK ANALYSIS." Facta Universitatis, Series: Automatic Control and Robotics 17, no. 3 (January 8, 2019): 205. http://dx.doi.org/10.22190/fuacr1803205a.
Full textZhu, Lei, Yi-Chang Chiu, and Yuche Chen. "Road network abstraction approach for traffic analysis: framework and numerical analysis." IET Intelligent Transport Systems 11, no. 7 (September 1, 2017): 424–30. http://dx.doi.org/10.1049/iet-its.2016.0287.
Full textFrançoisse, Kevin, Ilkka Kivimäki, Amin Mantrach, Fabrice Rossi, and Marco Saerens. "A bag-of-paths framework for network data analysis." Neural Networks 90 (June 2017): 90–111. http://dx.doi.org/10.1016/j.neunet.2017.03.010.
Full textDoi, Suhail A. R., and Jan J. Barendregt. "A generalized pairwise modelling framework for network meta-analysis." International Journal of Evidence-Based Healthcare 16, no. 4 (December 2018): 187–94. http://dx.doi.org/10.1097/xeb.0000000000000140.
Full textM, Durai Pandian. "PERFORMANCE ANALYSIS AND QOS FRAMEWORK OF FLY WİRELESS NETWORK." IRO Journal on Sustainable Wireless Systems 01, no. 02 (June 16, 2019): 103–15. http://dx.doi.org/10.36548/jsws.2019.2.003.
Full text., Rashmi MR. "A NOVEL DISTRIBUTED INTRUSION DETECTION FRAMEWORK FOR NETWORK ANALYSIS." International Journal of Research in Engineering and Technology 04, no. 08 (August 25, 2015): 246–51. http://dx.doi.org/10.15623/ijret.2015.0408043.
Full text