Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital evidence
biblio
Current Trends in Internet of Things Forensics
Submitted by grigby1 on Fri, 09/01/2023 - 3:20pm
Internet of Things
digital forensic DF
Human Factors
blockchains
Regulation
information forensics
digital evidence
Market research
Digital Forensics
Switches
Training
data acquisition
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Digital Forensic Analysis on Caller ID Spoofing Attack
Submitted by grigby1 on Wed, 08/16/2023 - 3:38pm
IDS
SIM card forensic
NIST SP 800-101R1
mobile forensic
caller ID spoofing
fraud
digital forensic
Oxygen
digital evidence
information security
Digital Forensics
composability
Big Data
NIST
Conferences
Resiliency
resilience
pubcrawl
biblio
Detection of relevant digital evidence in the forensic timelines
Submitted by grigby1 on Fri, 12/23/2022 - 11:53am
Organizations
security
pubcrawl
Metrics
Resiliency
Computer crime
composability
operating systems
Digital Forensics
Windows Operating System Security
digital evidence
local outlier factor
File systems
Sequential analysis
digital forensic analysis
forensic timeline
biblio
Developing Trends and Challenges of Digital Forensics
Submitted by grigby1 on Mon, 06/06/2022 - 12:14pm
Market research
social media forensics
IoT Forensics
cloud forensics
cyber crime
Resiliency
Media
digital evidence
network forensics
social networking (online)
Cloud Computing
documentation
Digital Forensics
Metrics
data privacy
Scalability
resilience
Human behavior
pubcrawl
biblio
Cybercrime Countermeasure of Insider Threat Investigation
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
DPI method
Scalability
Resiliency
resilience
pubcrawl
Organizations
Online banking
law enforcement
Inspection
insider threat investigation
insider threat
Big Data
digital investigation process
digital evidence
deep packet inspection methods
deep packet inspection
cybercrime threats
cybercrime investigation
cybercrime insider investigation
cybercrime countermeasure
Computer crime
biblio
Towards a Generic Approach for Memory Forensics
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
Kernel
Scalability
Resiliency
resilience
Random access memory
pubcrawl
PDB file
microsoft windows
Metrics
Memory Forensics
Application's data
information forensics
Human Factors
Human behavior
Forensics
digital evidence
Debugging information
debugging
data structures
Data mining
biblio
Digital Forensics: Maintaining Chain of Custody Using Blockchain
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
Human behavior
security
Scalability
Resiliency
resilience
Reliability
pubcrawl
participants
Metrics
legislation
Law
information forensics
hyperledger composer
Human Factors
assets
encryption
distributed ledger
Distributed databases
Digital Forensics
digital evidence
Cybercrime
Cryptography
Conferences
Computer crime
chain of custody maintenance
chain of custody
blockchain
Base64
biblio
Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
Database Security
causality
centralised vector-clock architecture
chain of custody
chain of custody properties
CoC properties
commercial database systems
database audit
database audit records
auditing capabilities
digital evidence
forensically-aware distributed database architecture
hybrid logical clocks
role segregation
third-party verification
transactional databases
user transactions
Security Audits
Provenance
computer architecture
Resiliency
Human behavior
pubcrawl
Distributed databases
Forensics
Digital Forensics
Data mining
security
Proposals
database forensics
database management systems
Scalability
Clocks
auditing
action accountability
admissible audit records
biblio
Tor Browser Forensics in Exploring Invisible Evidence
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Resiliency
Tor browser forensics
Relays
perpetrators
onion routing
onion router
invisible evidence
Internet crimes
information security offenses
information security incidents
incognito
Facebook
endeavors
digital evidence
DH-HEMTs
internet
Tor
Digital Forensics
Compositionality
Browser Security
online front-ends
Computer crime
Forensics
Cryptography
Browsers
Metrics
Human behavior
pubcrawl
resilience
tools
biblio
Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
digital forensic practitioner
Random access memory
pubcrawl170109
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT
1
2
next ›
last »