Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Forensics
biblio
Establishing Independent Audit Mechanisms for Database Management Systems
Submitted by grigby1 on Mon, 07/01/2019 - 9:02am
Scalability
logging
malicious hacking
meta data
metadata
Organizations
pubcrawl
Random access memory
resilience
Resiliency
independent audit mechanisms
security
security audit
security audit tools
Security Audits
security breaches
security threat
storage image
tamper-detection software
tools
Digital Forensics
auditing
comprehensive audit framework
Computer crime
computer crimes
database forensic analysis
database forensics
database forensics methods
database management systems
Databases
apriori database preparation
evidence gathering
file system metadata
forensic audit tools
Forensics
Human behavior
Human Factors
Image reconstruction
independent audit framework
biblio
A Layer-Built Method to the Relevancy of Electronic Evidence
Submitted by aekwall on Wed, 05/08/2019 - 8:42am
Human behavior
standards
Scalability
resilience
relevancy of evidenc
pubcrawl
Metrics
layer-built method
law enforcement
judicial practice
information forensics
analytical process
Forensics
feature extraction
electronic evidence
discretionary evidence
Digital Forensics
cyber crimes
criminal investigation
Correlation
Computer crime
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 8:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
Tor Browser Forensics in Exploring Invisible Evidence
Submitted by grigby1 on Fri, 04/05/2019 - 9:27am
Resiliency
Tor browser forensics
Relays
perpetrators
onion routing
onion router
invisible evidence
Internet crimes
information security offenses
information security incidents
incognito
Facebook
endeavors
digital evidence
DH-HEMTs
internet
Tor
Digital Forensics
Compositionality
Browser Security
online front-ends
Computer crime
Forensics
Cryptography
Browsers
Metrics
Human behavior
pubcrawl
resilience
tools
biblio
Covert and Deniable Communications
Submitted by grigby1 on Fri, 02/22/2019 - 3:08pm
censorship resistance.
composability
deception
Forensics
Metrics
mixes
privacy
privacy enhancing technology
pubcrawl
Steganography
steganography detection
biblio
Channel Steganalysis
Submitted by grigby1 on Fri, 02/22/2019 - 3:07pm
channel
composability
Forensics
Metrics
privacy
pubcrawl
steganalysis
Steganography
steganography detection
biblio
A Dynamic Taint Analysis Tool for Android App Forensics
Submitted by grigby1 on Thu, 02/14/2019 - 10:19am
Humanoid robots
tools
taint analysis
real-world apps
real-world Android apps
pubcrawl
online app stores
Mobile handsets
mobile forensic toolkits
mobile device
mobile computing
Metrics
Manuals
law enforcement investigators
android
Forensics
forensic evidentiary data
dynamic Taint analysis tool
Digital Forensics
digital forensic practitioners
digital forensic
Databases
composability
benchmark apps
automated mobile app analysis tool
app-generated evidence
Androids
Android app forensics
biblio
Secure, Consistent, and High-Performance Memory Snapshotting
Submitted by grigby1 on Thu, 02/14/2019 - 10:17am
Cloud Security
Forensics
Hardware Security
Human Factors
malware and unwanted software
Metrics
pubcrawl
Scalability
Tamper resistance
biblio
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers
Submitted by grigby1 on Wed, 01/16/2019 - 1:32pm
Micro-Honeypot
browser fingerprinting technique
conventional web honeypots
cybercrime traceability
fingerprint
Fingerprint recognition
Forensics
honeypot
IP networks
Browser Fingerprinting
stepping stones
track attackers
tracking
web attacker
Web attacks
Web Browser Security
Compositionality
Browsers
data privacy
security
pubcrawl
Human behavior
Metrics
Resiliency
Hardware
invasive software
internet
Web sites
computer network security
Servers
Cryptography
Computer crime
anonymous networks
attack information
biblio
A tool to compute approximation matching between windows processes
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
digital forensics scenarios
Windows Operating System Security
windows processes
Windows memory dump
Windows
volatility
memory image file
image matching
Image forensics
forensics memory image
Forensics
forensic memory analysis
forensic analysis
file organisation
executable file
dumping process
tools
cryptographic hashing functions
cryptographic hash values
bytewise approximate matching
Binary codes
approximation matching algorithms
Approximation algorithms
Microsoft Windows (operating systems)
microsoft windows
Cryptography
malware
composability
Resiliency
Metrics
pubcrawl
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »