Academic literature on the topic 'Browser forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Browser forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Browser forensics"

1

El-Tayeb, Mahmoud, Ahmed Taha, and Zaki Taha. "Streamed Video Reconstruction for Firefox Browser Forensics." Ingénierie des systèmes d information 26, no. 4 (August 31, 2021): 337–44. http://dx.doi.org/10.18280/isi.260401.

Full text
Abstract:
In criminal investigations, the digital evidence extracted from social media may provide exceptional support. Reviewing the history or cache of the web browser may provide a valuable insight into the activity of the suspect. The growing popularity of Internet video streaming creates a risk of this technology misuse. There are a few published research on video reconstruction forensics on the Chrome browser. There is a difference in the methods applied to reconstruct cached video on Chrome from the methods applied to Firefox or any browser. Our primary focus in this research is to examine the forensic procedures required to reconstruct cached video stream data using Twitter and YouTube on the Firefox browser. Some work has been done to reconstruct a cached video on the Chrome browser, but we need more work on the rest of the browsers, most notably the Firefox browser used in this research. Both examination strategies and contemplations displayed are approved and suitable for the forensic study of various streaming platforms as well as the web browser caches.
APA, Harvard, Vancouver, ISO, and other styles
2

Faiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (March 30, 2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.

Full text
Abstract:
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.
APA, Harvard, Vancouver, ISO, and other styles
3

Umar, Rusydi, Anton Yudhana, and Muhammad Nur Faiz. "Experimental Analysis of Web Browser Sessions Using Live Forensics Method." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 2951. http://dx.doi.org/10.11591/ijece.v8i5.pp2951-2958.

Full text
Abstract:
<span>In today's digital era almost every aspect of life requires the internet, one way to access the internet is through a web browser. For security reasons, one developed is private mode. Unfortunately, some users using this feature do it for cybercrime. The use of this feature is to minimize the discovery of digital evidence. The standard investigative techniques of NIST need to be developed to uncover an ever-varied cybercrime. Live Forensics is an investigative development model for obtaining evidence of computer usage. This research provides a solution in forensic investigation effectively and efficiently by using live forensics. This paper proposes a framework for web browser analysis. Live Forensics allows investigators to obtain data from RAM that contains computer usage sessions. </span>
APA, Harvard, Vancouver, ISO, and other styles
4

Daulay, Zikri Sulthoni, and Rini Indrayani. "ANALISIS KEAMANAN BROWSER DALAM BERSOSIAL MEDIA MENGGUNAKAN METODE INSTITUTE OF JUSTICE (NIJ)." Djtechno: Jurnal Teknologi Informasi 3, no. 2 (December 30, 2022): 167–75. http://dx.doi.org/10.46576/djtechno.v3i2.2598.

Full text
Abstract:
Active users of social media in Indonesia continue to increase every year. But there are still many users who do not understand the security of accessing social media, especially when accessing with a browser. For this reason, the browsers analyzed in this study are the Google Chrome and Mozilla Firefox browsers with two modes, namely public mode and incognito mode. This study aims to identify the level of browser security in using social media in the browser. The method used is the NIJ (National Institute of Justice) methodology. The tool used to get the data is using the FTK Imager 4.5.0.3 application. The results of this study are when accessing social media Facebook, Instagram, Twitter is not safe using Google Chrome and Mozilla Firefox browsers with public mode and incognito mode because user_id, email and some passwords are still detected in the FTK Imager tool. For the percentage results obtained in the study, namely 89% of user_id data, passwords, emails found in public mode Google Chrome browsers, 67% data found in incognito mode Google Chrome browsers, 78% data found in public mode Mozilla Firefox browsers, and 89% of data found in Mozilla Firefox browser incognito mode.Keywords: Live Forensics; Institute of Justice; Browser; Media Sosial; FTK Imager
APA, Harvard, Vancouver, ISO, and other styles
5

Sarjimin, Herman, and Anton Yudhana. "Perbandingan Tool Forensik pada Mozilla Firefox Private Mode Menggunakan Metode NIST." Jurnal Algoritma 18, no. 1 (November 26, 2021): 283–91. http://dx.doi.org/10.33364/algoritma/v.18-1.873.

Full text
Abstract:
Penggunaan System Operasi Linux yang didistribusikan secara open source menjadikannya operating system yang dapat didistribusikan secara masif oleh banyak perusahaan. PC/Notebook maupun perangkat pintar yang berbasiskan Linux semakin diminati oleh user karena dalam proses distribusinya tidak dipungut biaya apapun. Memberikan layanan browsing internet kepada para user secara privat dan tidak meninggalkan jejak digital merupakan salah satu upaya yang dilakukan oleh web browser sebagai upaya invovasi web browser mendapatkan pengguna layanan sebanyak-banyaknya. Metode investigasi forensic web browser private mode menjadi hal yang perlu guna menjadi acuan dalam melakukan forensic terhadap kasus/kejadian kejahatan yang melibatkan layanan browsing secara privat. Ada banyak tools yang dapat dimanfaatkan untuk melakukan live forensics dan analisis data. Penelitian ini berhasil mengungkap bahwa layanan browsing secara privat yang disediakan oleh Mozilla Firefox nyata-nyata tidak privat secara menyeluruh. Artefak digital masih dapat ditemukan dalam RAM dan dianalisa dengan menggunakan berbagai macam tools untuk forensic, tools Autopsy berhasil mendapatkan data log browser sebesar 83%. Hasil artefak investigasi tersebut dapat menjadi acuan permulaan para investigator dalam penegakan hukum untuk mencari tersangka lain dan mendalami sebuah kasus yang melibatkan banyak pihak.
APA, Harvard, Vancouver, ISO, and other styles
6

Kinasih, Ratri Ayunita, Arif Wirawan Muhammad, and Wahyu Adi Prabowo. "Analisis Live Forensics Pada Keamanan Browser Untuk Mencegah Pencurian Akun (Studi Kasus: Facebook dan Instagram)." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 1, 2020): 174–85. http://dx.doi.org/10.31849/digitalzone.v11i2.4678.

Full text
Abstract:
Pencurian data digital sangat meresahkan pengguna media sosial, terlebih pengguna Facebook dan Instagram yang merupakan media sosial dengan jumlah pengguna terbanyak. Browser yang digunakan untuk mengakses media sosial harus terjamin keamanannya. Analisis browser untuk mengetahui browser mana yang paling aman digunakan untuk mengakses media sosial sangat penting. Agar pengguna media sosial tidak perlu khawatir terjadi pencurian data. Browser yang akan dianalisis yaitu Google Chrome, Mozilla Firefox, dan Microsoft Edge. Penelitian ini dilakukan menggunakan skenario dengan menggunakan teknik live forensics agar data yang didapatkan masih terekam dalam Random Access Memory (RAM), khususnya data volatile seperti email dan password. Dalam penelitian ini didapatkan bukti digital seperti email, password, username, dan data-data pribadi lainnya dengan menggunakan tools FTK Imager. Kata kunci: Browser, Facebook, FTK Imager, Instagram, Live Forensics
APA, Harvard, Vancouver, ISO, and other styles
7

Sidiq, Muhammad Fajar, and Muhammad Nur Faiz. "Review Tools Web Browser Forensics untuk Mendukung Pencarian Bukti Digital." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 1 (April 23, 2019): 67. http://dx.doi.org/10.26418/jp.v5i1.31430.

Full text
Abstract:
Perkembangan penggunaan internet yang semakin banyak setiap tahunnya mengakibatkan penggunaan web browser juga meningkat. Hal ini berdampak pada kejahatan dengan menggunakan web browser juga meningkat seperti penyalahgunaan email, hoax, hate speech, penipuan dan lainnya. Penelitian ini menunjukkan pentingnya mengenali aktivitas penggunaan web browser dari sisi korban dan pelaku. Penggunaan web browser ini akan menentukan pola atau alur kejahatan pada suatu insiden kejahatan. Hal ini akan membantu penyidik dalam menganalisis bukti digital secara cepat dan dapat mengungkap jenis kejahatan yang terjadi secara baik. Bukti digital yang dianalisis seperti akun, kata kunci pencarian, kunjungan web, dan lainnya. Penelitian ini memberikan penjelasan lokasi penyimpanan bukti digital, format waktu yang digunakan dan 10 tools yang digunakan penyidik dalam mengungkap kejahatan dengan media web browser seperti Google Chrome, Mozilla Firefox, Internet Explorer, Safari dan Opera.
APA, Harvard, Vancouver, ISO, and other styles
8

Pandela, Tomi, and Imam Riadi. "Browser Forensics on Web-based Tiktok Applications." International Journal of Computer Applications 175, no. 34 (December 17, 2020): 47–52. http://dx.doi.org/10.5120/ijca2020920897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rochmadi, Tri, Imam Riadi, and Yudi Prayudi. "Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser." International Journal of Computer Applications 164, no. 8 (April 17, 2017): 31–37. http://dx.doi.org/10.5120/ijca2017913717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fanani, Galih, Imam Riadi, and Anton Yudhana. "Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop." JURNAL MEDIA INFORMATIKA BUDIDARMA 6, no. 2 (April 25, 2022): 1263. http://dx.doi.org/10.30865/mib.v6i2.3946.

Full text
Abstract:
The development of information technology has had various positive and negative effects. The positive impact that information technology can have is to make it easier for people to communicate with others in the world, and the negative impact is that society is out of control when using its applications. It is an attitude that causes various crimes in the world caused by cyberspace (cybercrime) One of the most widely used instant messaging applications is Michat. The MiChat app causes cybercrime, pornography, online gambling, fraud, cyberbullying and drug trafficking. Evidence research is conducted using one of the frameworks of the digital forensic research workshop. In this framework, forensic identification, preservation, collection, investigation, analysis, and presentation phases are designed to find evidence of digital crime. The forensic tools used to collect evidence are mobility forensic express pro, a DB browser for SQLite, and oxygen forensic detective. Results are presented in the form of reports and evidence, and text chat files, contacts, images, audio, video, and web caches are generated. Forensic tools have a 100% success rate in finding evidence. Comparing the functions of the three forensic tools, the mobility forensic express pro has a processing rate of 66.7%, DB browser for SQLite has 33.3%, and oxygen forensic detective has 83.3%. Digital evidence can be used as corroborating evidence in a trial
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Browser forensics"

1

Dal, Cero Massimiliano. "sistema server-side di acquisizione forense di contenuti web asincroni." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14895/.

Full text
Abstract:
La presente tesi nasce dalla sentita necessità, proveniente dal mondo dell'informatica forense (anche detta “digital forensics”), di riuscire a catturare in modo completo, attendibile e affidabile tutte quelle prove digitali (e-evidence) veicolate a mezzo del Web moderno e della sua relativa evoluzione asincrona. Scopo del progetto di tesi sarà quindi quello di creare uno strumento forense di acquisizione di contenuti Web asincroni e/o comunque di articolata fruizione, in grado di aggiungersi al panorama presente (sia forense che tecnologico) potendo offrire caratteristiche ad oggi ancora inespresse da altri prodotti con intenti simili.
APA, Harvard, Vancouver, ISO, and other styles
2

Bogen, Alfred Christopher. "Selecting keyword search terms in computer forensics examinations using domain analysis and modeling." Diss., Mississippi State : Mississippi State University, 2006. http://sun.library.msstate.edu/ETD-db/ETD-browse/browse.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

James, Peter. "Secure portable execution and storage environments: A capability to improve security for remote working." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1707.

Full text
Abstract:
Remote working is a practice that provides economic benefits to both the employing organisation and the individual. However, evidence suggests that organisations implementing remote working have limited appreciation of the security risks, particularly those impacting upon the confidentiality and integrity of information and also on the integrity and availability of the remote worker’s computing environment. Other research suggests that an organisation that does appreciate these risks may veto remote working, resulting in a loss of economic benefits. With the implementation of high speed broadband, remote working is forecast to grow and therefore it is appropriate that improved approaches to managing security risks are researched. This research explores the use of secure portable execution and storage environments (secure PESEs) to improve information security for the remote work categories of telework, and mobile and deployed working. This thesis with publication makes an original contribution to improving remote work information security through the development of a body of knowledge (consisting of design models and design instantiations) and the assertion of a nascent design theory. The research was conducted using design science research (DSR), a paradigm where the research philosophies are grounded in design and construction. Following an assessment of both the remote work information security issues and threats, and preparation of a set of functional requirements, a secure PESE concept was defined. The concept is represented by a set of attributes that encompass the security properties of preserving the confidentiality, integrity and availability of the computing environment and data. A computing environment that conforms to the concept is considered to be a secure PESE, the implementation of which consists of a highly portable device utilising secure storage and an up-loadable (on to a PC) secure execution environment. The secure storage and execution environment combine to address the information security risks in the remote work location. A research gap was identified as no existing ‘secure PESE like’ device fully conformed to the concept, enabling a research problem and objectives to be defined. Novel secure storage and execution environments were developed and used to construct a secure PESE suitable for commercial remote work and a high assurance secure PESE suitable for security critical remote work. The commercial secure PESE was trialled with an existing telework team looking to improve security and the high assurance secure PESE was trialled within an organisation that had previously vetoed remote working due to the sensitivity of the data it processed. An evaluation of the research findings found that the objectives had been satisfied. Using DSR evaluation frameworks it was determined that the body of knowledge had improved an area of study with sufficient evidence generated to assert a nascent design theory for secure PESEs. The thesis highlights the limitations of the research while opportunities for future work are also identified. This thesis presents ten published papers coupled with additional doctoral research (that was not published) which postulates the research argument that ‘secure PESEs can be used to manage information security risks within the remote work environment’.
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Bo-Ying, and 林伯穎. "Recovering User’s Activity from Deleted Log Files in Web Browser Forensics." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/tmem5d.

Full text
Abstract:
碩士
國立臺灣大學
電機工程學研究所
105
In today''s era of International Network vigorous development, Internet become an essential tool for every person every day. The most convenient tool for surfing the Internet is the browser, so most used applications by the majority of user of computer are also web browsers. In the large number of network data transmission at the same time, the network has also become a way to help crime. When users use browser, the traces of their browsing are also recorded in the hard drive including history, searching key, cache, cookies, download list, login information, bookmarks etc. These items are stored specified log files of folders, and forensic investigators will be able to obtain evidence as an important source of evidence. This will have a great help for forensic investigators. However, that suspects may delete theses records will cause a large challenge for forensic investigators. In the paper, we analyze useful browsing records for Google Chrome on Windows7, and explore how to recover illegal activity when an illegal person deletes a browsing history. We propose a novel methodology to solve the problem that the browsing history is deleted. The methodology uses simple and free forensics tool, but can achieve good result to recover browsing records.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Browser forensics"

1

Hassan, Nihad A. "Web Browser and E-mail Forensics." In Digital Forensics Basics, 247–89. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-3838-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boucher, Jacques, Kim-Kwang Raymond Choo, and Nhien-An Le-Khac. "Web Browser Forensics—A Case Study with Chrome Browser." In Studies in Big Data, 251–91. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16127-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nelson, Rebecca, Atul Shukla, and Cory Smith. "Web Browser Forensics in Google Chrome, Mozilla Firefox, and the Tor Browser Bundle." In Studies in Big Data, 219–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23547-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Warren, Christopher, Eman El-Sheikh, and Nhien-An Le-Khac. "Privacy Preserving Internet Browsers: Forensic Analysis of Browzar." In Computer and Network Security Essentials, 369–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chetry, Arjun, and Uzzal Sharma. "Analysis of Browsing Activity of Portable Opera Browser in Windows 10 Pro System in VMware Workstation Using Digital Forensics Software." In International Conference on Innovative Computing and Communications, 575–83. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2821-5_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gunapriya, Srihitha, Valli Kumari Vatsavayi, and Kalidindi Sandeep Varma. "Forensic Investigation of Tor Bundled Browser." In Advances in Intelligent Systems and Computing, 281–89. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6176-8_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vatsavayi, Valli Kumari, and Kalidindi Sandeep Varma. "Retrieving TOR Browser Digital Artifacts for Forensic Evidence." In Advances in Intelligent Systems and Computing, 265–74. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9516-5_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Adnan, Abdul Rehman Javed, Zunera Jalil, Gautam Srivastava, and Thippa Reddy Gadekallu. "Privacy of Web Browsers: A Challenge in Digital Forensics." In Lecture Notes in Electrical Engineering, 493–504. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8430-2_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saini, Anil, Manoj Singh Gaur, and Vijay Laxmi. "A Taxonomy of Browser Attacks." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 291–313. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch019.

Full text
Abstract:
Browser attacks over the years have stormed the Internet world with so many malicious activities. They provide unauthorized access and damage or disrupt user information within or outside the browser. This chapter focuses on the complete attack actions adopted by an attacker while crafting an attack on Web browser. The knowledge gained from the attacker's actions can be framed into a suitable taxonomy, which can then be used as a framework for examining the browser attack footprints, vulnerability in browser design, and helps one to understand the characteristics and nature of an attacker. This chapter presents a browser attack taxonomy that helps in combating new browser attacks and improving browser security.
APA, Harvard, Vancouver, ISO, and other styles
10

Daniel, Larry E., and Lars E. Daniel. "Internet History (Web and Browser Caching)." In Digital Forensics for Legal Professionals, 213–18. Elsevier, 2012. http://dx.doi.org/10.1016/b978-1-59749-643-8.00031-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Browser forensics"

1

Marrington, Andrew, Ibrahim Baggili, Talal Al Ismail, and Ali Al Kaf. "Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers." In 2012 International Conference on Computer Systems and Industrial Informatics (ICCSII). IEEE, 2012. http://dx.doi.org/10.1109/iccsii.2012.6454516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mahaju, Sweta, and Travis Atkison. "Evaluation of Firefox Browser Forensics Tools." In ACM SE '17: SouthEast Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3077286.3077310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chiu Huang, Ming-Jung, Yu-Lun Wan, Chang-Po Chiang, and Shiuh-Jeng Wang. "Tor Browser Forensics in Exploring Invisible Evidence." In 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2018. http://dx.doi.org/10.1109/smc.2018.00663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dija, S., V. Indu, A. Sajeena, and J. A. Vidhya. "A Framework for Browser Forensics in Live Windows Systems." In 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2017. http://dx.doi.org/10.1109/iccic.2017.8524412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dija, S., J. Ajana, V. Indu, and M. Sabarinath. "Web Browser Forensics for Retrieving Searched Keywords on the Internet." In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021. http://dx.doi.org/10.1109/icac3n53548.2021.9725457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

WU, Zhaoxu, Haibo LUO, Haomin PANG, and Biwu YI. "Research and practice of browser electronic data forensics based on SVM." In Second International Conference on Digital Signal and Computer Communications (DSCC 2022), edited by Sandeep Saxena. SPIE, 2022. http://dx.doi.org/10.1117/12.2641529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aktepe, Safa, Cihan Varol, and Narasimha Shashidhar. "MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hariharan, Meenu, Akash Thakar, and Parvesh Sharma. "Forensic Analysis of Private Mode Browsing Artifacts in Portable Web Browsers Using Memory Forensics." In 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS). IEEE, 2022. http://dx.doi.org/10.1109/ic3sis54991.2022.9885379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gros, Tobias, Richard Dirauf, and Felix Freiling. "Systematic Analysis of Browser History Evidence." In 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2020. http://dx.doi.org/10.1109/sadfe51007.2020.00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nalawade, Apurva, Smita Bharne, and Vanita Mane. "Forensic analysis and evidence collection for web browser activity." In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016. http://dx.doi.org/10.1109/icacdot.2016.7877639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography