Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Digital Forensics
biblio
Wiping Techniques and Anti-Forensics Methods
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
metadata
Writing
wiping techniques
wiping standards
tools
standards
software products developement
secure file destruction
Scalability
resilience
pubcrawl
product development
Metrics
anti-forensics methods
meta data
local storage devices
information forensics
Human behavior
forensic analysis
File systems
erasure standards
eraser software
Digital Forensics
data wiping
Cryptography
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
A Framework for a Forensically Sound Harvesting the Dark Web
Submitted by aekwall on Wed, 05/08/2019 - 9:41am
Scalability
Human behavior
pubcrawl
Metrics
Digital Forensics
resilience
dark web
forensic soundness
information forensics
biblio
Structural Limitations of B+-Tree Forensics
Submitted by aekwall on Wed, 05/08/2019 - 9:41am
Scalability
Human behavior
pubcrawl
Metrics
Digital Forensics
resilience
database forensics
Databases
information forensics
biblio
Tor Browser Forensics in Exploring Invisible Evidence
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Resiliency
Tor browser forensics
Relays
perpetrators
onion routing
onion router
invisible evidence
Internet crimes
information security offenses
information security incidents
incognito
Facebook
endeavors
digital evidence
DH-HEMTs
internet
Tor
Digital Forensics
Compositionality
Browser Security
online front-ends
Computer crime
Forensics
Cryptography
Browsers
Metrics
Human behavior
pubcrawl
resilience
tools
biblio
Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems
Submitted by aekwall on Mon, 03/04/2019 - 10:47am
hardware-in-the-loop
Wide Area Monitoring Protection and Control
wide area monitoring
WAMPAC systems
Substations
substation
smart power grids
Smart Grids
Protection and Control systems
power system forensics
power system analysis computing
PMUs
Phasor measurement units
knowledge based systems
knowledge base
human-in-the-loop security center paradigm
hardware-in-the loop simulation
forensic investigations
Forensic Artifacts
Evidence
authentication
attack-based digital forensic evidences
Digital Forensics
attribution
Metrics
composability
pubcrawl
Human behavior
cyber-attack
Monitoring
biblio
Deleted Data Attribution in Cloud Computing Platforms
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
human-in-the-loop security center paradigm
Cloud Computing
Human behavior
pubcrawl
composability
Metrics
metadata
attribution
cloud forensic
data acquisition
data deletion
digital forensic
Digital Forensics
file attribution
NIST
biblio
A Dynamic Taint Analysis Tool for Android App Forensics
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
Humanoid robots
tools
taint analysis
real-world apps
real-world Android apps
pubcrawl
online app stores
Mobile handsets
mobile forensic toolkits
mobile device
mobile computing
Metrics
Manuals
law enforcement investigators
android
Forensics
forensic evidentiary data
dynamic Taint analysis tool
Digital Forensics
digital forensic practitioners
digital forensic
Databases
composability
benchmark apps
automated mobile app analysis tool
app-generated evidence
Androids
Android app forensics
biblio
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones
Submitted by grigby1 on Thu, 01/31/2019 - 12:17pm
instant messaging applications
user chat message details
Smartphones
smart phones
Scalability
Resiliency
resilience
pubcrawl
mobile users
mobile networks
mobile forensic investigations
mobile devices
mobile computing
Metrics
local artifacts
instant messaging chat modes
android
instant messaging application
Instant messaging
Humanoid robots
Human Factors
Human behavior
electronic messaging
Digital Forensics
digital forensic analysis
digital forensic
Databases
Androids
Android smartphones
Android operating systems
android encryption
Android (operating system)
biblio
A dark web story in-depth research and study conducted on the dark web based on forensic computing and security in Malaysia
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
URL
website links
skynet
Malaysia
forensic computing
dark web story
dark web security
cryptocurrency
Government
Instruments
pubcrawl
Digital Forensics
dark web
Web sites
internet
drugs
Conferences
malware
Human Factors
Human behavior
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »