Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Digital Forensics
biblio
Timestamp Hiccups: Detecting Manipulated Filesystem Timestamps on NTFS
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
composability
Digital Forensics
filesystem
Information Leakage
information security
Metrics
NTFS
privacy
pubcrawl
Steganography
steganography detection
biblio
Secure Lightweight Context-Driven Data Logging for Bodyworn Sensing Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
Scalability
medical domain
Medical services
Monitoring
privacy
pubcrawl
recording
resilience
Resiliency
Medical diagnostic imaging
secure lightweight context-driven data logging
sensor medical data storage
sensor placement
sensors
timestamping
wearable technology
wearables security
Biomedical monitoring
medical computing
Logic gates
localization
Human behavior
Forensics
Digital Forensics
data structures
data handling
data fingerprint storage
contextual information security
chronological epoch-level blocks
bodyworn sensing devices
body sensor networks
Bloom filters
blockchain
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory
biblio
Authorship Attribution for Social Media Forensics
Submitted by grigby1 on Mon, 03/19/2018 - 1:38pm
social networking (online)
multimodal data processing
prepaid SIM cards
pubcrawl
public Wi-Fi hotspots
smart phones
Smartphones
social media
social media forensics
Metrics
Speech
stylometry
supervised learning-based
user anonymity
user identification
Writing
writing style
authorship attribution
Media
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
Human behavior
habit peculiarities
Forensics
feature extraction
distributed networks
Digital Forensics
context exploitation
Context
computational linguistics
authorship attribution algorithm
biblio
Insider Misuse Attribution Using Biometrics
Submitted by grigby1 on Mon, 03/05/2018 - 1:17pm
biometrics
data leak
Digital Forensics
guilty identification
Human behavior
Human Factors
information forensics
Metrics
pubcrawl
resilience
Resiliency
Scalability
Steganography
biblio
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)
Submitted by grigby1 on Mon, 03/05/2018 - 1:17pm
Digital Forensics
Digital Forensics Model
Human behavior
Human Factors
information forensics
Internet of Things
IoT
IoT applications
IoT Forensics
IoT security
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
Enhanced Operating System Protection to Support Digital Forensic Investigations
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
operating systems (computers)
forensic-friendly OS design
Forensics
fully homomorphic encryption
Metrics
obfuscation
operating system extensions
operating system protection
operating systems
Forensic software
OS tamper-resistance
pubcrawl
resilience
Resiliency
security
system data recovery
White Box Encryption
white-box cryptography
Cryptography
CEF
Ciphers
component encryption
composability
computer systems
computing on encrypted data
computing with encrypted functions
criminal activity footprints
CED
data integrity
data provenance
data veracity
digital forensic investigations
Digital Forensics
encryption
evidence collection
biblio
User Attribution Based on Keystroke Dynamics in Digital Forensic Readiness Process
Submitted by grigby1 on Mon, 03/05/2018 - 1:03pm
keystroke dynamics
user attribution
security
Scalability
Reliability
pubcrawl
policy-based governance
pattern extraction
Organizations
attribute-based encryption
Human Factors
Human behavior
forensic readiness
feature extraction
Digital Forensics
collaboration
biometrics (access control)
biblio
Digital Forensic Readiness Framework Based on Behavioral-Biometrics for User Attribution
Submitted by grigby1 on Mon, 03/05/2018 - 1:03pm
Human behavior
user attribution
Scalability
pubcrawl
policy-based governance
Organizations
ISO/IEC 27043 standard
IEC standards
Human Factors
attribute-based encryption
Digital forensics Readiness
Digital Forensics
digital forensic readiness framework
collaboration
biometrics (access control)
Behavioral biometrics
authentication
biblio
A Case Study for Mobile Device Forensics Tools
Submitted by K_Hooper on Wed, 02/28/2018 - 11:35am
app
Compositionality
Digital Forensics
Human Factors
ios
iOS Security
Metrics
open source tools
pubcrawl
Resiliency
smartphone
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »