Journal articles on the topic 'Anti-computer forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Anti-computer forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (April 2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.
Full textYang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (March 4, 2020): 9. http://dx.doi.org/10.3390/jimaging6030009.
Full textZhong, Xiu Yu, and Feng Zeng. "A New Approach of Computer Forensics Based on Steganalysis." Advanced Materials Research 631-632 (January 2013): 1385–89. http://dx.doi.org/10.4028/www.scientific.net/amr.631-632.1385.
Full textChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (January 2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Full textDahbur, Kamal, and Bassil Mohammad. "Toward Understanding the Challenges and Countermeasures in Computer Anti-Forensics." International Journal of Cloud Applications and Computing 1, no. 3 (July 2011): 22–35. http://dx.doi.org/10.4018/ijcac.2011070103.
Full textJing Peng, Can Wang, and Hu Wu. "A Novel File-Concealing Method for Computer Anti-Forensics." Journal of Convergence Information Technology 8, no. 6 (March 31, 2013): 1203–10. http://dx.doi.org/10.4156/jcit.vol8.issue6.143.
Full textChen, Hu. "Dilemmas in Digital Forensics for Computer Equipment Security and Maintenance in Remote Ships." Advanced Materials Research 490-495 (March 2012): 1382–86. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.1382.
Full textCastillo Camacho, Ivan, and Kai Wang. "A Comprehensive Review of Deep-Learning-Based Methods for Image Forensics." Journal of Imaging 7, no. 4 (April 3, 2021): 69. http://dx.doi.org/10.3390/jimaging7040069.
Full textSihwail, Rami, Khairuddin Omar, Khairul Zainol Ariffin, and Sanad Al Afghani. "Malware Detection Approach Based on Artifacts in Memory Image and Dynamic Analysis." Applied Sciences 9, no. 18 (September 5, 2019): 3680. http://dx.doi.org/10.3390/app9183680.
Full textBerghel, Hal. "Hiding data, forensics, and anti-forensics." Communications of the ACM 50, no. 4 (April 2007): 15–20. http://dx.doi.org/10.1145/1232743.1232761.
Full textQureshi, Muhammad Ali, and El-Sayed M. El-Alfy. "Bibliography of digital image anti-forensics and anti-anti-forensics techniques." IET Image Processing 13, no. 11 (September 19, 2019): 1811–23. http://dx.doi.org/10.1049/iet-ipr.2018.6587.
Full textSartin, Bryan. "ANTI-Forensics – distorting the evidence." Computer Fraud & Security 2006, no. 5 (May 2006): 4–6. http://dx.doi.org/10.1016/s1361-3723(06)70354-2.
Full textKowalski, Marcin, and Krzysztof Mierzejewski. "Detection of 3D face masks with thermal infrared imaging and deep learning techniques." Photonics Letters of Poland 13, no. 2 (June 30, 2021): 22. http://dx.doi.org/10.4302/plp.v13i2.1091.
Full textDistefano, Alessandro, Gianluigi Me, and Francesco Pace. "Android anti-forensics through a local paradigm." Digital Investigation 7 (August 2010): S83—S94. http://dx.doi.org/10.1016/j.diin.2010.05.011.
Full textLee, Kyoungho, Hyunuk Hwang, Kibom Kim, and BongNam Noh. "Robust bootstrapping memory analysis against anti-forensics." Digital Investigation 18 (August 2016): S23—S32. http://dx.doi.org/10.1016/j.diin.2016.04.009.
Full textForte, Dario, and Richard Power. "A tour through the realm of anti-forensics." Computer Fraud & Security 2007, no. 6 (June 2007): 18–20. http://dx.doi.org/10.1016/s1361-3723(07)70079-9.
Full textWani, Mohamad Ahtisham, Ali AlZahrani, and Wasim Ahmad Bhat. "File system anti-forensics – types, techniques and tools." Computer Fraud & Security 2020, no. 3 (March 2020): 14–19. http://dx.doi.org/10.1016/s1361-3723(20)30030-0.
Full textBosschert, Thijs. "Battling Anti-Forensics: Beating the U3 Stick." Journal of Digital Forensic Practice 1, no. 4 (June 22, 2007): 265–73. http://dx.doi.org/10.1080/15567280701417975.
Full textCadle, Brian A., Kristin C. Rasmus, Juan A. Varela, Leah S. Leverich, Casey E. O'Neill, Ryan K. Bachtell, and Donald C. Cooper. "Cellular Phone-Based Image Acquisition and Quantitative Ratiometric Method for Detecting Cocaine and Benzoylecgonine for Biological and Forensic Applications." Substance Abuse: Research and Treatment 4 (January 2010): SART.S5025. http://dx.doi.org/10.4137/sart.s5025.
Full textWang, Z. J., Min Wu, H. V. Zhao, W. Trappe, and K. J. Ray Liu. "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation." IEEE Transactions on Image Processing 14, no. 6 (June 2005): 804–21. http://dx.doi.org/10.1109/tip.2005.847284.
Full textHilley, S. "Anti-forensics with a small army of exploits." Digital Investigation 4, no. 1 (March 2007): 13–15. http://dx.doi.org/10.1016/j.diin.2007.01.005.
Full textDallaway, Eleanor. "Steganography is key ingredient to anti-forensics." Infosecurity 5, no. 8 (November 2008): 11. http://dx.doi.org/10.1016/s1754-4548(08)70146-3.
Full textSmith, Aaron. "Describing and Categorizing Disk-Avoiding Anti-Forensics Tools." Journal of Digital Forensic Practice 1, no. 4 (June 22, 2007): 309–13. http://dx.doi.org/10.1080/15567280701418155.
Full textAhn, Na Young, and Dong Hoon Lee. "Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective." IEEE Access 9 (2021): 14130–37. http://dx.doi.org/10.1109/access.2021.3052353.
Full textSharma, Shishir, Hareesh Ravi, A. V. Subramanyam, and Sabu Emmanuel. "Anti-forensics of median filtering and contrast enhancement." Journal of Visual Communication and Image Representation 66 (January 2020): 102682. http://dx.doi.org/10.1016/j.jvcir.2019.102682.
Full textWu, Jianyuan, and Wei Sun. "Towards multi-operation image anti-forensics with generative adversarial networks." Computers & Security 100 (January 2021): 102083. http://dx.doi.org/10.1016/j.cose.2020.102083.
Full textSun, Hung-Min, Chi-Yao Weng, Chin-Feng Lee, and Cheng-Hsing Yang. "Anti-Forensics with Steganographic Data Embedding in Digital Images." IEEE Journal on Selected Areas in Communications 29, no. 7 (August 2011): 1392–403. http://dx.doi.org/10.1109/jsac.2011.110806.
Full textChuang, Wei-Hong, Ravi Garg, and Min Wu. "Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis." IEEE Transactions on Information Forensics and Security 8, no. 12 (December 2013): 2073–88. http://dx.doi.org/10.1109/tifs.2013.2285515.
Full textZou, Hao, Pengpeng Yang, Rongrong Ni, and Yao Zhao. "Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network." Security and Communication Networks 2021 (March 24, 2021): 1–8. http://dx.doi.org/10.1155/2021/6663486.
Full textLi, Xiaowen, Diqun Yan, Li Dong, and Rangding Wang. "Anti-Forensics of Audio Source Identification Using Generative Adversarial Network." IEEE Access 7 (2019): 184332–39. http://dx.doi.org/10.1109/access.2019.2960097.
Full textConlan, Kevin, Ibrahim Baggili, and Frank Breitinger. "Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy." Digital Investigation 18 (August 2016): S66—S75. http://dx.doi.org/10.1016/j.diin.2016.04.006.
Full textKim, Dohyun, Wonhyuk Ahn, and Heung-Kyu Lee. "End-to-End Anti-Forensics Network of Single and Double JPEG Detection." IEEE Access 9 (2021): 13390–402. http://dx.doi.org/10.1109/access.2021.3051678.
Full textForte, Dario. "Dealing with forensic software vulnerabilities: is anti-forensics a real danger?" Network Security 2008, no. 12 (December 2008): 18–20. http://dx.doi.org/10.1016/s1353-4858(08)70143-0.
Full textFan, Wei, Kai Wang, Francois Cayre, and Zhang Xiong. "JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality." IEEE Transactions on Information Forensics and Security 9, no. 8 (August 2014): 1211–26. http://dx.doi.org/10.1109/tifs.2014.2317949.
Full textAkbar, Muh Hajar, Sunardi Sunardi, and Imam Riadi. "Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM." JISKA (Jurnal Informatika Sunan Kalijaga) 5, no. 2 (September 10, 2020): 96. http://dx.doi.org/10.14421/jiska.2020.52-04.
Full textDas, Tanmoy Kanti. "Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients." Multimedia Tools and Applications 77, no. 24 (June 12, 2018): 31835–54. http://dx.doi.org/10.1007/s11042-018-6170-7.
Full textGöbel, Thomas, and Harald Baier. "Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding." Digital Investigation 24 (March 2018): S111—S120. http://dx.doi.org/10.1016/j.diin.2018.01.014.
Full textGoh, Weihan, Peng Chor Leong, and Chai Kiat Yeo. "A Plausibly-Deniable, Practical Trusted Platform Module Based Anti-Forensics Client-Server System." IEEE Journal on Selected Areas in Communications 29, no. 7 (August 2011): 1377–91. http://dx.doi.org/10.1109/jsac.2011.110805.
Full textCui, Qi, Ruohan Meng, Zhili Zhou, Xingming Sun, and Kaiwen Zhu. "An anti-forensic scheme on computer graphic images and natural images using generative adversarial networks." Mathematical Biosciences and Engineering 16, no. 5 (2019): 4923–35. http://dx.doi.org/10.3934/mbe.2019248.
Full textSingh, Kulbir, Ankush Kansal, and Gurinder Singh. "An improved median filtering anti-forensics with better image quality and forensic undetectability." Multidimensional Systems and Signal Processing 30, no. 4 (February 27, 2019): 1951–74. http://dx.doi.org/10.1007/s11045-019-00637-8.
Full textBharathiraja S and Rajesh Kanna B. "Anti-Forensics Contrast Enhancement Detection (AFCED) Technique in Images Based on Laplace Derivative Histogram." Mobile Networks and Applications 24, no. 4 (April 19, 2019): 1174–80. http://dx.doi.org/10.1007/s11036-019-01255-1.
Full textJung, Seungwon, Seunghee Seo, Yeog Kim, and Changhoon Lee. "Memory Layout Extraction and Verification Method for Reliable Physical Memory Acquisition." Electronics 10, no. 12 (June 9, 2021): 1380. http://dx.doi.org/10.3390/electronics10121380.
Full textWang, Yongwei, Xin Ding, Yixin Yang, Li Ding, Rabab Ward, and Z. Jane Wang. "Perception matters: Exploring imperceptible and transferable anti-forensics for GAN-generated fake face imagery detection." Pattern Recognition Letters 146 (June 2021): 15–22. http://dx.doi.org/10.1016/j.patrec.2021.03.009.
Full textFan, Wei, Kai Wang, Francois Cayre, and Zhang Xiong. "Corrections to “JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality” [Aug 14 1211-1226]." IEEE Transactions on Information Forensics and Security 11, no. 11 (November 2016): 2628. http://dx.doi.org/10.1109/tifs.2016.2585398.
Full textWesley Lane, Simon. "Are local authority fraud teams fit for purpose?" Journal of Financial Crime 18, no. 2 (May 10, 2011): 195–213. http://dx.doi.org/10.1108/13590791111127769.
Full textAgarwal, Saurabh, and Ki-Hyun Jung. "HSB-SPAM: An Efficient Image Filtering Detection Technique." Applied Sciences 11, no. 9 (April 21, 2021): 3749. http://dx.doi.org/10.3390/app11093749.
Full textde Capoa, A., C. Grappelli, F. R. Febbo, A. Span�, A. Niveleau, A. Cafolla, I. Cordone, and R. Foa. "Methylation levels of normal and chronic lymphocytic leukemia B lymphocytes: computer-assisted quantitative analysis of anti-5-methylcytosine antibody binding to individual nuclei." Cytometry 36, no. 2 (June 1, 1999): 157–59. http://dx.doi.org/10.1002/(sici)1097-0320(19990601)36:2<157::aid-cyto10>3.0.co;2-k.
Full textSalamh, Fahad E., Umit Karabiyik, Marcus K. Rogers, and Eric T. Matson. "A Comparative UAV Forensic Analysis: Static and Live Digital Evidence Traceability Challenges." Drones 5, no. 2 (May 21, 2021): 42. http://dx.doi.org/10.3390/drones5020042.
Full textWidmaier, Moritz, Tobias Wiestler, Jill Walker, Craig Barker, Marietta L. Scott, Farzad Sekhavati, Alexei Budco, et al. "Comparison of continuous measures across diagnostic PD-L1 assays in non-small cell lung cancer using automated image analysis." Modern Pathology 33, no. 3 (September 16, 2019): 380–90. http://dx.doi.org/10.1038/s41379-019-0349-y.
Full textRahardjo, Budi, and I. Putu Agus Eka Pratama. "Pengujian Dan Analisa Anti Komputer Forensik Menggunakan Shred Tool." Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, August 1, 2016, 104. http://dx.doi.org/10.24843/lkjiti.2016.v07.i02.p04.
Full text