Academic literature on the topic 'Network forensic tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network forensic tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network forensic tools"
Adeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (January 2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.
Full textQureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.
Full textHaggerty, John, Alexander J. Karran, David J. Lamb, and Mark Taylor. "A Framework for the Forensic Investigation of Unstructured Email Relationship Data." International Journal of Digital Crime and Forensics 3, no. 3 (July 2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.
Full textMontgomery, Jacob M., Santiago Olivella, Joshua D. Potter, and Brian F. Crisp. "An Informed Forensics Approach to Detecting Vote Irregularities." Political Analysis 23, no. 4 (2015): 488–505. http://dx.doi.org/10.1093/pan/mpv023.
Full textArévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas, and Gustavo Adolfo Higuera Castro. "Forensic analysis with hacking tools on android devices." Visión electrónica 13, no. 1 (January 31, 2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.
Full textBintang, Rauhulloh Noor, Rusydi Umar, and Anton Yudhana. "Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method." Scientific Journal of Informatics 8, no. 1 (May 10, 2021): 1–9. http://dx.doi.org/10.15294/sji.v8i1.26744.
Full textGhannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.
Full textRaman, Jayakrishnan Anilakkad, and Vasanthi Varadharajan. "HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics." Ingénierie des systèmes d information 26, no. 3 (June 30, 2021): 319–27. http://dx.doi.org/10.18280/isi.260309.
Full textYasin, Firmansyah, Abdul Fadlil, and Rusydi Umar. "Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (February 20, 2021): 91–98. http://dx.doi.org/10.29207/resti.v5i1.2784.
Full textRiadi, Imam, Sunardi Sunardi, and Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics." Jurnal Teknik Elektro 10, no. 1 (June 20, 2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.
Full textDissertations / Theses on the topic "Network forensic tools"
Zembjaková, Martina. "Prieskum a taxonómia sieťových forenzných nástrojov." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445488.
Full textQaisi, Ahmed Abdulrheem Jerribi. "Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool." Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.
Full textDenton, Tarryn-Chevonne Morgaine. "Forensic audio : the relevance of Electric Network Frequency Analysis as an authentication tool in South Africa." Diss., 2015. http://hdl.handle.net/2263/50875.
Full textMini-dissertation (MMus)--University of Pretoria, 2015.
tm2015
Music
Mmus
Unrestricted
Books on the topic "Network forensic tools"
How to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.
Find full textBook chapters on the topic "Network forensic tools"
Joshi, R. C., and Emmanuel S. Pilli. "Network Forensic Tools." In Computer Communications and Networks, 71–93. London: Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7299-4_4.
Full textAmato, Flora, Giovanni Cozzolino, Marco Giacalone, Antonino Mazzeo, Francesco Moscato, and Francesco Romeo. "Overview of Digital Forensic Tools for DataBase Analysis." In Advances in Network-Based Information Systems, 939–43. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_85.
Full textShashidhara, D., and Minavathi. "A Survey: On Network Forensic Data Acquisition and Analysis Tools." In Lecture Notes in Electrical Engineering, 649–59. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5802-9_57.
Full textShukla, Utkarsha, Bishwas Mandal, and K. V. D. Kiran. "Perlustration on Mobile Forensics Tools." In Computer Networks and Inventive Communication Technologies, 1225–31. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9647-6_97.
Full textChen, Chia-Mei, Gu-Hsin Lai, and Zheng-Xun Tsai. "Integrated Forensic Tool for Network Attacks." In Security with Intelligent Computing and Big-data Services, 451–55. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_35.
Full textGentry, Eric, Ryan McIntyre, Michael Soltys, and Frank Lyu. "SEAKER: A Tool for Fast Digital Forensic Triage." In Lecture Notes in Networks and Systems, 1227–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_87.
Full textDhaka, Priyanka, and Bharti Nagpal. "ABFT: Analytics to Uplift Big Social Events Using Forensic Tools." In Handbook of Computer Networks and Cyber Security, 929–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-22277-2_38.
Full textBerbecaru, Diana. "On Creating Digital Evidence in IP Networks With NetTrack." In Handbook of Research on Network Forensics and Analysis Techniques, 225–45. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4100-4.ch012.
Full textCarlton, Gregory H., and Hill Zhou. "A Survey of Cloud Computing Challenges from a Digital Forensics Perspective." In Advancements and Innovations in Wireless Communications and Network Technologies, 213–28. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2154-1.ch016.
Full textAl-Saedy, Hasan L. "Cyber Crimes." In Handbook of Research on Threat Detection and Countermeasures in Network Security, 154–68. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6583-5.ch009.
Full textConference papers on the topic "Network forensic tools"
Ghabban, Fahad M., Ibrahim M. Alfadli, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm, and Mahmoud Ahmad Al-Khasawneh. "Comparative Analysis of Network Forensic Tools and Network Forensics Processes." In 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2021. http://dx.doi.org/10.1109/icscee50312.2021.9498226.
Full textNarayanan, A. Sankara, and M. Mohamed Ashik. "Computer Forensic First Responder Tools." In 2012 International Conference on Advances in Mobile Network, Communication and its Applications (MNCAPPS). IEEE, 2012. http://dx.doi.org/10.1109/mncapps.2012.38.
Full textNorthrop, Erik E., and Heather R. Lipford. "Exploring the Usability of Open Source Network Forensic Tools." In the 2014 ACM Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2663887.2663903.
Full textMate, Mrunal H., and Smita R. Kapse. "Network Forensic Tool -- Concept and Architecture." In 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2015. http://dx.doi.org/10.1109/csnt.2015.204.
Full textKelly, Michael D., and Sean J. Geoghegan. "FIRST Forensic Internet Replay Sequencing Tool." In 2009 Eighth IEEE International Symposium on Network Computing and Applications (NCA). IEEE, 2009. http://dx.doi.org/10.1109/nca.2009.44.
Full textSeyitoglu, Efe U. A., Attila A. Yavuz, and Muslum Ozgur Ozmen. "Compact and Resilient Cryptographic Tools for Digital Forensics." In 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 2020. http://dx.doi.org/10.1109/cns48642.2020.9162236.
Full textAe Chun, Soon, and Francisco Artigas. "Tide gate sensor network as a forensic tool." In dg.o 2013: 14th Annual International Conference on Digital Government Research. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2479724.2479771.
Full textHunt, Ray. "New developments in network forensics — Tools and techniques." In 2012 18th IEEE International Conference on Networks (ICON). IEEE, 2012. http://dx.doi.org/10.1109/icon.2012.6506587.
Full textSiddiqui, Ali, Oguntoyinbo Olufunmilayo, Hardik Gohel, and Bishwajeet Pandey. "Digital Healthcare System Vulnerability Analysis using Network Forensic Tool." In 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2021. http://dx.doi.org/10.1109/csnt51715.2021.9509647.
Full textMalik, Parveen, and Kannan Karthik. "Limitation of PFA-events as a forensic tool." In 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2017. http://dx.doi.org/10.1109/spin.2017.8049940.
Full text