Academic literature on the topic 'Anti-computer forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anti-computer forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anti-computer forensics"
Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (April 2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.
Full textYang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (March 4, 2020): 9. http://dx.doi.org/10.3390/jimaging6030009.
Full textZhong, Xiu Yu, and Feng Zeng. "A New Approach of Computer Forensics Based on Steganalysis." Advanced Materials Research 631-632 (January 2013): 1385–89. http://dx.doi.org/10.4028/www.scientific.net/amr.631-632.1385.
Full textChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (January 2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Full textDahbur, Kamal, and Bassil Mohammad. "Toward Understanding the Challenges and Countermeasures in Computer Anti-Forensics." International Journal of Cloud Applications and Computing 1, no. 3 (July 2011): 22–35. http://dx.doi.org/10.4018/ijcac.2011070103.
Full textJing Peng, Can Wang, and Hu Wu. "A Novel File-Concealing Method for Computer Anti-Forensics." Journal of Convergence Information Technology 8, no. 6 (March 31, 2013): 1203–10. http://dx.doi.org/10.4156/jcit.vol8.issue6.143.
Full textChen, Hu. "Dilemmas in Digital Forensics for Computer Equipment Security and Maintenance in Remote Ships." Advanced Materials Research 490-495 (March 2012): 1382–86. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.1382.
Full textCastillo Camacho, Ivan, and Kai Wang. "A Comprehensive Review of Deep-Learning-Based Methods for Image Forensics." Journal of Imaging 7, no. 4 (April 3, 2021): 69. http://dx.doi.org/10.3390/jimaging7040069.
Full textSihwail, Rami, Khairuddin Omar, Khairul Zainol Ariffin, and Sanad Al Afghani. "Malware Detection Approach Based on Artifacts in Memory Image and Dynamic Analysis." Applied Sciences 9, no. 18 (September 5, 2019): 3680. http://dx.doi.org/10.3390/app9183680.
Full textBerghel, Hal. "Hiding data, forensics, and anti-forensics." Communications of the ACM 50, no. 4 (April 2007): 15–20. http://dx.doi.org/10.1145/1232743.1232761.
Full textDissertations / Theses on the topic "Anti-computer forensics"
Bade, Hans, and Oscar Hedlund. "Anti-Forensik : Anti-forensiska metoder på mobila enheter." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701.
Full textMobile phones have become essential for the extraction of digital artifacts in foren-sic investigations. Android’s Linux-based operating systems bring greater potentialfor anti-forensic methods, which means that knowledge of anti-forensics is essen-tial to today’s IT forensic investigators. In this study, the effect of anti-forensicson Android-based mobile devices is highlighted, as well as revealing today’s anti-forensic attack methods against forensic tools. By experiment, it is shown how toprevent a forensic tool from extracting data by using a simple script.
Etow, Tambue Ramine. "IMPACT OF ANTI-FORENSICS TECHNIQUES ON DIGITAL FORENSICS INVESTIGATION." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97116.
Full textTagesson, Samuel. "Anti-forensik mot minnesforensik : En litteraturstudie om anti-forensiska metoder mot minnesdumpning och minnesanalys." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17818.
Full textIT forensics face many difficulties in their work of obtaining and analyzing data. Criminals are using more and more anti-forensic methods to hide evidence that can be used against them. One common anti-forensic method is encryption. In order for IT forensics to access the encrypted information, the encryption key can be found in the memory of the computer. This makes the computer's memory valuable to retrieved and analyze. However, there are several anti-forensic methods that a criminal can use to prevent the memory from being retrieved or analyzed. This study performs a systematic literature study to identify the current anti-forensic methods against memory analysis and memory dumping on Windows system. Several methods are addressed where, among other things, the operating system is modified or built-in security functions on the CPU are used to prevent information being retrieved or analyzed from memory.
Jacobsson, Emma, and Wistad Ebba Andersson. "Digital bevisning : En definition." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44963.
Full textDigitaliseringen av samhället har bidragit till en enklare vardag för den svenskabefolkningen. Denna vardag består till stor del av digital teknik som sparar information om oss och våra handlingar från digitala enheter. Insamlad digital information kan användas som bevismaterial i en rättsprocess. Trots den kraftfulla ökningen av IT-brott verkar Sverige sakna en officiell vedertagen beskrivning för begreppet digital bevisning. Arbetets syfte har varit att föreslå två definitioner; en för lekmän och en som lämpar sig för tekniskt kunniga. Arbetet fördjupar sig inom tre områden och bidrar därmed till ett helhetsperspektiv för att få en förståelse för vad digital bevisning är. Problemområdena innefattar den digitala bevisningens värde i ett domstolsbeslut, hur anti-forensik påverkar utvinningen och legitimiteten av digitala bevis. För att få en större förståelse för utmaningarna inom de angivna problemområdena har ett antal anställda inom polismyndigheten fått svara på frågor som riktar sig till deras arbetsuppgifter. Deltagarna som har blivit tillfrågade arbetar som utredare, förundersökningsledare, IT-forensiker och åklagare. Deltagarnas svar har tillsammans med tidigare forskning skapat utgångspunkten för att definiera begreppet digital bevisning och skapa en mera gedigen förståelse för digitala bevis.
Daniels, Jason M. "Forensic and Anti-Forensic Techniques for OLE2-Formatted Documents." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/141.
Full textBooks on the topic "Anti-computer forensics"
Phishing Exposed. Syngress, 2005.
Find full textBook chapters on the topic "Anti-computer forensics"
Pajek, Przemyslaw, and Elias Pimenidis. "Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation." In Global Security, Safety, and Sustainability, 145–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04062-7_16.
Full textBhardwaj, Dinesh, Chothmal Kumawat, and Vinod Pankajakshan. "A Method for Detecting JPEG Anti-forensics." In Communications in Computer and Information Science, 190–97. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0020-2_17.
Full textDing, Ning, Dawu Gu, and Zhiqiang Liu. "Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 241–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23602-0_23.
Full textGupta, Deepak, and Babu M. Mehtre. "Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 247–51. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14289-0_17.
Full textDahbur, Kamal, and Bassil Mohammad. "Toward Understanding the Challenges and Countermeasures in Computer Anti-Forensics." In Cloud Computing Advancements in Design, Implementation, and Technologies, 176–89. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-1879-4.ch013.
Full textShelke, Priya Makarand, and Rajesh Shardanand Prasad. "Tradeoffs Between Forensics and Anti-Forensics of Digital Images." In Computer Vision, 2124–38. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5204-8.ch093.
Full text"Attack Graphs with Anti-Forensics Tool - in Forensics Examination." In International Conference on Computer Research and Development, 5th (ICCRD 2013), 137–42. ASME Press, 2013. http://dx.doi.org/10.1115/1.860182_ch23.
Full textConference papers on the topic "Anti-computer forensics"
Hausknecht, K., and S. Gruicic. "Anti-computer forensics." In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2017. http://dx.doi.org/10.23919/mipro.2017.7973612.
Full textnLeng, Jing, and Tonghong Li. "Research on Computer System Information Hiding Anti-Forensic Technology." In 8th International Conference on Social Network, Communication and Education (SNCE 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/snce-18.2018.12.
Full text