Literatura académica sobre el tema "Network forensic tools"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Network forensic tools".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Network forensic tools"
Adeyemi, Ikuesan R., Shukor Abd Razak y Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis". International Journal of Digital Crime and Forensics 5, n.º 1 (enero de 2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.
Texto completoQureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand y Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework". Security and Communication Networks 2021 (28 de agosto de 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.
Texto completoHaggerty, John, Alexander J. Karran, David J. Lamb y Mark Taylor. "A Framework for the Forensic Investigation of Unstructured Email Relationship Data". International Journal of Digital Crime and Forensics 3, n.º 3 (julio de 2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.
Texto completoMontgomery, Jacob M., Santiago Olivella, Joshua D. Potter y Brian F. Crisp. "An Informed Forensics Approach to Detecting Vote Irregularities". Political Analysis 23, n.º 4 (2015): 488–505. http://dx.doi.org/10.1093/pan/mpv023.
Texto completoArévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas y Gustavo Adolfo Higuera Castro. "Forensic analysis with hacking tools on android devices". Visión electrónica 13, n.º 1 (31 de enero de 2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.
Texto completoBintang, Rauhulloh Noor, Rusydi Umar y Anton Yudhana. "Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method". Scientific Journal of Informatics 8, n.º 1 (10 de mayo de 2021): 1–9. http://dx.doi.org/10.15294/sji.v8i1.26744.
Texto completoGhannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone". Journal of Applied Information, Communication and Technology 5, n.º 2 (28 de octubre de 2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.
Texto completoRaman, Jayakrishnan Anilakkad y Vasanthi Varadharajan. "HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics". Ingénierie des systèmes d information 26, n.º 3 (30 de junio de 2021): 319–27. http://dx.doi.org/10.18280/isi.260309.
Texto completoYasin, Firmansyah, Abdul Fadlil y Rusydi Umar. "Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST". Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, n.º 1 (20 de febrero de 2021): 91–98. http://dx.doi.org/10.29207/resti.v5i1.2784.
Texto completoRiadi, Imam, Sunardi Sunardi y Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics". Jurnal Teknik Elektro 10, n.º 1 (20 de junio de 2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.
Texto completoTesis sobre el tema "Network forensic tools"
Zembjaková, Martina. "Prieskum a taxonómia sieťových forenzných nástrojov". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445488.
Texto completoQaisi, Ahmed Abdulrheem Jerribi. "Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool". Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.
Texto completoDenton, Tarryn-Chevonne Morgaine. "Forensic audio : the relevance of Electric Network Frequency Analysis as an authentication tool in South Africa". Diss., 2015. http://hdl.handle.net/2263/50875.
Texto completoMini-dissertation (MMus)--University of Pretoria, 2015.
tm2015
Music
Mmus
Unrestricted
Libros sobre el tema "Network forensic tools"
How to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.
Buscar texto completoCapítulos de libros sobre el tema "Network forensic tools"
Joshi, R. C. y Emmanuel S. Pilli. "Network Forensic Tools". En Computer Communications and Networks, 71–93. London: Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7299-4_4.
Texto completoAmato, Flora, Giovanni Cozzolino, Marco Giacalone, Antonino Mazzeo, Francesco Moscato y Francesco Romeo. "Overview of Digital Forensic Tools for DataBase Analysis". En Advances in Network-Based Information Systems, 939–43. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_85.
Texto completoShashidhara, D. y Minavathi. "A Survey: On Network Forensic Data Acquisition and Analysis Tools". En Lecture Notes in Electrical Engineering, 649–59. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5802-9_57.
Texto completoShukla, Utkarsha, Bishwas Mandal y K. V. D. Kiran. "Perlustration on Mobile Forensics Tools". En Computer Networks and Inventive Communication Technologies, 1225–31. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9647-6_97.
Texto completoChen, Chia-Mei, Gu-Hsin Lai y Zheng-Xun Tsai. "Integrated Forensic Tool for Network Attacks". En Security with Intelligent Computing and Big-data Services, 451–55. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_35.
Texto completoGentry, Eric, Ryan McIntyre, Michael Soltys y Frank Lyu. "SEAKER: A Tool for Fast Digital Forensic Triage". En Lecture Notes in Networks and Systems, 1227–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_87.
Texto completoDhaka, Priyanka y Bharti Nagpal. "ABFT: Analytics to Uplift Big Social Events Using Forensic Tools". En Handbook of Computer Networks and Cyber Security, 929–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-22277-2_38.
Texto completoBerbecaru, Diana. "On Creating Digital Evidence in IP Networks With NetTrack". En Handbook of Research on Network Forensics and Analysis Techniques, 225–45. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4100-4.ch012.
Texto completoCarlton, Gregory H. y Hill Zhou. "A Survey of Cloud Computing Challenges from a Digital Forensics Perspective". En Advancements and Innovations in Wireless Communications and Network Technologies, 213–28. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2154-1.ch016.
Texto completoAl-Saedy, Hasan L. "Cyber Crimes". En Handbook of Research on Threat Detection and Countermeasures in Network Security, 154–68. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6583-5.ch009.
Texto completoActas de conferencias sobre el tema "Network forensic tools"
Ghabban, Fahad M., Ibrahim M. Alfadli, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm y Mahmoud Ahmad Al-Khasawneh. "Comparative Analysis of Network Forensic Tools and Network Forensics Processes". En 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2021. http://dx.doi.org/10.1109/icscee50312.2021.9498226.
Texto completoNarayanan, A. Sankara y M. Mohamed Ashik. "Computer Forensic First Responder Tools". En 2012 International Conference on Advances in Mobile Network, Communication and its Applications (MNCAPPS). IEEE, 2012. http://dx.doi.org/10.1109/mncapps.2012.38.
Texto completoNorthrop, Erik E. y Heather R. Lipford. "Exploring the Usability of Open Source Network Forensic Tools". En the 2014 ACM Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2663887.2663903.
Texto completoMate, Mrunal H. y Smita R. Kapse. "Network Forensic Tool -- Concept and Architecture". En 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2015. http://dx.doi.org/10.1109/csnt.2015.204.
Texto completoKelly, Michael D. y Sean J. Geoghegan. "FIRST Forensic Internet Replay Sequencing Tool". En 2009 Eighth IEEE International Symposium on Network Computing and Applications (NCA). IEEE, 2009. http://dx.doi.org/10.1109/nca.2009.44.
Texto completoSeyitoglu, Efe U. A., Attila A. Yavuz y Muslum Ozgur Ozmen. "Compact and Resilient Cryptographic Tools for Digital Forensics". En 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 2020. http://dx.doi.org/10.1109/cns48642.2020.9162236.
Texto completoAe Chun, Soon y Francisco Artigas. "Tide gate sensor network as a forensic tool". En dg.o 2013: 14th Annual International Conference on Digital Government Research. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2479724.2479771.
Texto completoHunt, Ray. "New developments in network forensics — Tools and techniques". En 2012 18th IEEE International Conference on Networks (ICON). IEEE, 2012. http://dx.doi.org/10.1109/icon.2012.6506587.
Texto completoSiddiqui, Ali, Oguntoyinbo Olufunmilayo, Hardik Gohel y Bishwajeet Pandey. "Digital Healthcare System Vulnerability Analysis using Network Forensic Tool". En 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2021. http://dx.doi.org/10.1109/csnt51715.2021.9509647.
Texto completoMalik, Parveen y Kannan Karthik. "Limitation of PFA-events as a forensic tool". En 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2017. http://dx.doi.org/10.1109/spin.2017.8049940.
Texto completo