Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

windows processes

biblio

Visible to the public A tool to compute approximation matching between windows processes

Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
  • digital forensics scenarios
  • Windows Operating System Security
  • windows processes
  • Windows memory dump
  • Windows
  • volatility
  • memory image file
  • image matching
  • Image forensics
  • forensics memory image
  • Forensics
  • forensic memory analysis
  • forensic analysis
  • file organisation
  • executable file
  • dumping process
  • tools
  • cryptographic hashing functions
  • cryptographic hash values
  • bytewise approximate matching
  • Binary codes
  • approximation matching algorithms
  • Approximation algorithms
  • Microsoft Windows (operating systems)
  • microsoft windows
  • Cryptography
  • malware
  • composability
  • Resiliency
  • Metrics
  • pubcrawl

Terms of Use  |  ©2023. CPS-VO