Academic literature on the topic 'Network forensic tools'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network forensic tools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Network forensic tools"

1

Adeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (January 2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.

Full text
Abstract:
Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as well as to investigators, and ultimately, researchers. The need for an efficient cutting-edge research finding in curbing network crimes therefore is undeniably critical. This paper describes the distinction between network security and network forensics. In addition, the authors identify factors that militate against most network forensic techniques as well as the research challenges in network forensics. Furthermore, the paper discusses on the current research works on network forensics analysis. This research is useful to the research community of network forensics, for knowledge on existing research techniques, and direction on further research in network forensics.
APA, Harvard, Vancouver, ISO, and other styles
2

Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.

Full text
Abstract:
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be used to identify the source of the intrusion and the intruder’s location. Forensics can resolve many cybercrime cases using the methods of network forensics. These methods can extract intruder’s information, the nature of the intrusion, and how it can be prevented in the future. These techniques can also be used to avoid attacks in near future. Modern network forensic techniques face several challenges that must be resolved to improve the forensic methods. Some of the key challenges include high storage speed, the requirement of ample storage space, data integrity, data privacy, access to IP address, and location of data extraction. The details concerning these challenges are provided with potential solutions to these challenges. In general, the network forensic tools and techniques cannot be improved without addressing these challenges of the forensic network. This paper proposed a thematic taxonomy of classifications of network forensic techniques based on extensive. The classification has been carried out based on the target datasets and implementation techniques while performing forensic investigations. For this purpose, qualitative methods have been used to develop thematic taxonomy. The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate the information related to network attacks with minimum false-negative results. It will help organizations to investigate external and internal causes of network security attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

Haggerty, John, Alexander J. Karran, David J. Lamb, and Mark Taylor. "A Framework for the Forensic Investigation of Unstructured Email Relationship Data." International Journal of Digital Crime and Forensics 3, no. 3 (July 2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.

Full text
Abstract:
The continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data. Structured data provides qualitative information to the forensics examiner and is typically viewed through existing tools. Unstructured data is more complex as it comprises information associated with social networks, such as relationships within the network, identification of key actors and power relations, and there are currently no standardised tools for its forensic analysis. This paper posits a framework for the forensic investigation of email data. In particular, it focuses on the triage and analysis of unstructured data to identify key actors and relationships within an email network. This paper demonstrates the applicability of the approach by applying relevant stages of the framework to the Enron email corpus. The paper illustrates the advantage of triaging this data to identify (and discount) actors and potential sources of further evidence. It then applies social network analysis techniques to key actors within the data set. This paper posits that visualisation of unstructured data can greatly aid the examiner in their analysis of evidence discovered during an investigation.
APA, Harvard, Vancouver, ISO, and other styles
4

Montgomery, Jacob M., Santiago Olivella, Joshua D. Potter, and Brian F. Crisp. "An Informed Forensics Approach to Detecting Vote Irregularities." Political Analysis 23, no. 4 (2015): 488–505. http://dx.doi.org/10.1093/pan/mpv023.

Full text
Abstract:
Electoral forensics involves examining election results for anomalies to efficiently identify patterns indicative of electoral irregularities. However, there is disagreement about which, if any, forensics tool is most effective at identifying fraud, and there is no method for integrating multiple tools. Moreover, forensic efforts have failed to systematically take advantage of country-specific details that might aid in diagnosing fraud. We deploy a Bayesian additive regression trees (BART) model–a machine-learning technique–on a large cross-national data set to explore the dense network of potential relationships between various forensic indicators of anomalies and electoral fraud risk factors, on the one hand, and the likelihood of fraud, on the other. This approach allows us to arbitrate between the relative importance of different forensic and contextual features for identifying electoral fraud and results in a diagnostic tool that can be relatively easily implemented in cross-national research.
APA, Harvard, Vancouver, ISO, and other styles
5

Arévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas, and Gustavo Adolfo Higuera Castro. "Forensic analysis with hacking tools on android devices." Visión electrónica 13, no. 1 (January 31, 2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.

Full text
Abstract:
Currently, the use of mobile terminals is becoming a necessity for a high number of people around the world which has driven the development of devices with Android operating system; In addition to this, the same indiscriminate access to resources of internet and weak local and international regulations on the use, they have become vulnerable to attacks on the network - injection of malware, ransomware-, among many others. Therefore, this article reviews the hacking tools for the forensic investigation of mobile terminals, proposing from the documentary research a forensic information acquisition model to determine tangible and significant evidences as a probative material.
APA, Harvard, Vancouver, ISO, and other styles
6

Bintang, Rauhulloh Noor, Rusydi Umar, and Anton Yudhana. "Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method." Scientific Journal of Informatics 8, no. 1 (May 10, 2021): 1–9. http://dx.doi.org/10.15294/sji.v8i1.26744.

Full text
Abstract:
The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite Facebook lite can send a text message, image, or Video. Not a few users of Facebook lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application. In this investigation, National Institute of Standards and Technology NIST research methods with various stages, namely Collection, Examination, Analysis, and Reporting. While the forensic tools to be used are Magnet Axiom Forensic and MOBILedit Forensic Express Pro. Comparison and results of data conducted with forensic tools Magnet Axiom Forensic and MOBILedit Forensic Express Pro in the form of parameter data specified. Axiom Forensic Magnet data is 57.14% while MOBILedit Forensic Express Pro data is 85.71%. This data is the data of the performance results of both forensic tool applications in obtaining digital evidence on Facebook lite application.
APA, Harvard, Vancouver, ISO, and other styles
7

Ghannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.

Full text
Abstract:
WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.
APA, Harvard, Vancouver, ISO, and other styles
8

Raman, Jayakrishnan Anilakkad, and Vasanthi Varadharajan. "HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics." Ingénierie des systèmes d information 26, no. 3 (June 30, 2021): 319–27. http://dx.doi.org/10.18280/isi.260309.

Full text
Abstract:
With the pervasive usage of sensing systems and IoT things, the importance of security has increased. Attempts towards breaching IoT security systems by attackers are on upsurge. Many intrusions in embedded systems, sensing equipment and IoT things have occurred in the past. Though there are cyber security tools like Antivirus, Intrusion detection and prevention systems available for securing the digital devices and its networks. However, a forensic methodology to be followed for the analysis and investigation to detect origin cause of network incidents is lacking. This paper derives a comprehensive preventive cyber forensic process model with honeypots for the digital IoT investigation process which is formal, that can assist in the court of law in defining the reliability of the investigative process. One year data of various attacks to the IoT network has been recorded by the honeypots for this study. The newly derived model HIM has been validated using various methods and instead of converging on a particular aspect of investigation, it details the entire lifecycle of IoT forensic investigation. The model is targeted to address the forensic analysts’ requirements and the need of legal fraternity for a forensic model. The process model follows a preventive method which reduce further attacks on network.
APA, Harvard, Vancouver, ISO, and other styles
9

Yasin, Firmansyah, Abdul Fadlil, and Rusydi Umar. "Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (February 20, 2021): 91–98. http://dx.doi.org/10.29207/resti.v5i1.2784.

Full text
Abstract:
The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This study uses the Windump forensic tool as a means of recording network traffic activity. Network Miner and Wireshark as an analytical tool for identifying digital evidence. The use of the National Institute of Standard and Technology (NIST) method which collection, examination, analysis and reporting, can be repeated and maintained with the same data. Based on experiments with virtual router network traffic testing, the system built has succeeded in obtaining digital evidence, either by direct or indirectly. The system scenario that has been planned succeeded recording 220494 packages, but by the Windump, it is automatically divided into 9 (nine) parts of the package which are Buktidigital0 to Buktidigital8. The inspection stage produces evidence that has been verified by Wireshark and Network Miner. The analysis stage proves that there were attacks carried out by addresses 192.168.10.10 and 192.168.234.10. Based on the results of forensic testing, the use of the NIST method on a forensic system that has been built with a virtual router object can be used by investigators to identify evidence of cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Riadi, Imam, Sunardi Sunardi, and Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics." Jurnal Teknik Elektro 10, no. 1 (June 20, 2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.

Full text
Abstract:
Rapid development of computer technology is also accompanied with increasing of cybercrime. One of the most common crimes is fraud case in the online shop. This crime abuses Whatapps, one of the most popular Instant Messenger (IM) applications. WhatsApp is one of the IM applications that can be used on computers, especially on windows 8.1 operating system. All applications running on the computer leave data and information on Random Access Memory (RAM). The data and information that exist in RAM can be obtained using digital forensic technique calledLive Forensics. Live forensics can be used when the computer is running and connected to the network. This research aims to find digital evidence related to online shop fraud case. The digital evidence can be obtained using one of the forensic tools FTK Imager. FTK Imager can retrieve and analyze data and information on RAM. The results obtained in this research is the content of WhatsApp conversations that can be used as digital evidence to reveala fraud in the online shop.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Network forensic tools"

1

Zembjaková, Martina. "Prieskum a taxonómia sieťových forenzných nástrojov." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445488.

Full text
Abstract:
Táto diplomová práca sa zaoberá prieskumom a taxonómiou sieťových forenzných nástrojov. Popisuje základné informácie o sieťovej forenznej analýze, vrátane procesných modelov, techník a zdrojov dát používaných pri forenznej analýze. Ďalej práca obsahuje prieskum existujúcich taxonómií sieťových forenzných nástrojov vrátane ich porovnania, na ktorý naväzuje prieskum sieťových forenzných nástrojov. Diskutované sieťové nástroje obsahujú okrem nástrojov spomenutých v prieskume taxonómií aj niektoré ďalšie sieťové nástroje. Následne sú v práci detailne popísané a porovnané datasety, ktoré sú podkladom pre analýzu jednotlivými sieťovými nástrojmi. Podľa získaných informácií z vykonaných prieskumov sú navrhnuté časté prípady použitia a nástroje sú demonštrované v rámci popisu jednotlivých prípadov použitia. Na demonštrovanie nástrojov sú okrem verejne dostupných datasetov použité aj novo vytvorené datasety, ktoré sú detailne popísane vo vlastnej kapitole. Na základe získaných informácií je navrhnutá nová taxonómia, ktorá je založená na prípadoch použitia nástrojov na rozdiel od ostatných taxonómií založených na NFAT a NSM nástrojoch, uživateľskom rozhraní, zachytávaní dát, analýze, či type forenznej analýzy.
APA, Harvard, Vancouver, ISO, and other styles
2

Qaisi, Ahmed Abdulrheem Jerribi. "Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool." Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.

Full text
Abstract:
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmitted to particular destinations such as MySQL,Oracle databases or log files. The data is normally dumped to these destinations without a forensic standard structure. When digital evidence is needed, forensic specialists are required to analyse a very large volume of data. Even though forensic tools can be utilised, most of this process has to be done manually, consuming time and resources. In this research, we aim to address this issue by combining several existing tools to archive the original IDS data into a new container (Digital Evidence Bag) that has a structure based upon standard forensic processes. The aim is to develop a method to improve the current IDS database function in a forensic manner. This database will be optimised for future, forensic, analysis. Since evidence validity is always an issue, a secondary aim of this research is to develop a new monitoring scheme. This is to provide the necessary evidence to prove that an attacker had surveyed the network prior to the attack. To achieve this, we will set up a network that will be monitored by multiple IDSs. Open source tools will be used to carry input validation attacks into the network including SQL injection. We will design a new tool to obtain the original data in order to store it within the proposed DEB. This tool will collect the data from several databases of the different IDSs. We will assume that the IDS will not have been compromised.
APA, Harvard, Vancouver, ISO, and other styles
3

Denton, Tarryn-Chevonne Morgaine. "Forensic audio : the relevance of Electric Network Frequency Analysis as an authentication tool in South Africa." Diss., 2015. http://hdl.handle.net/2263/50875.

Full text
Abstract:
The predominance of digital media in modern society has presented a need for methods of authenticating digital audio. When an audio recording is presented as part of legal or business proceedings, it may be necessary to provide proof of authenticity. This minidissertation investigates to what extent Electric Network Frequency (ENF) analysis can be implemented as an authentication technique within a South African context. The electricity supply frequency exhibits random deviations in time from the nominal frequency of 50 Hz. ENF analysis is based on the premise that the supply frequency is detectable in audio recordings made on equipment utilising, or in close proximity to, electrical equipment that utilises the main electrical network. The recorded ENF signal can be extracted and used as a unique temporal identifier for determining the authenticity of an audio recording. Results of experiments conducted in this study indicate that it is possible for a detectable ENF signal to be induced into an audio recording, and subsequently isolated for further analysis. It is possible to compare the extracted ENF signal to the extracted ENF signal from a reliable database to determine temporal authenticity, and investigate the integrity of the file. It is found that the following minimum requirements must be met for successful ENF authenticity analysis: • The recording device be powered by the main electrical network, • The equipment be proven to be suitable for use in ENF analysis, i.e. no UPS device is used; the microphone does not have any electrical components that could alter the ENF signal, and the sound card does not induce any frequency components or noise into the signal; and • The availability of a reliable comparative temporal database of ENF values. Furthermore, results indicate that establishing an ENF temporal database by recording the supply frequency utilising a data acquisition unit, and subsequently processing the signal, is more practical than recording the database as an audio file. It was found that the South African electricity supply is sufficiently random to be suitable for ENF authenticity analysis. Recommendations for further study are made.
Mini-dissertation (MMus)--University of Pretoria, 2015.
tm2015
Music
Mmus
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Network forensic tools"

1

How to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Network forensic tools"

1

Joshi, R. C., and Emmanuel S. Pilli. "Network Forensic Tools." In Computer Communications and Networks, 71–93. London: Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7299-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Amato, Flora, Giovanni Cozzolino, Marco Giacalone, Antonino Mazzeo, Francesco Moscato, and Francesco Romeo. "Overview of Digital Forensic Tools for DataBase Analysis." In Advances in Network-Based Information Systems, 939–43. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shashidhara, D., and Minavathi. "A Survey: On Network Forensic Data Acquisition and Analysis Tools." In Lecture Notes in Electrical Engineering, 649–59. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5802-9_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shukla, Utkarsha, Bishwas Mandal, and K. V. D. Kiran. "Perlustration on Mobile Forensics Tools." In Computer Networks and Inventive Communication Technologies, 1225–31. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9647-6_97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Chia-Mei, Gu-Hsin Lai, and Zheng-Xun Tsai. "Integrated Forensic Tool for Network Attacks." In Security with Intelligent Computing and Big-data Services, 451–55. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gentry, Eric, Ryan McIntyre, Michael Soltys, and Frank Lyu. "SEAKER: A Tool for Fast Digital Forensic Triage." In Lecture Notes in Networks and Systems, 1227–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dhaka, Priyanka, and Bharti Nagpal. "ABFT: Analytics to Uplift Big Social Events Using Forensic Tools." In Handbook of Computer Networks and Cyber Security, 929–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-22277-2_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Berbecaru, Diana. "On Creating Digital Evidence in IP Networks With NetTrack." In Handbook of Research on Network Forensics and Analysis Techniques, 225–45. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4100-4.ch012.

Full text
Abstract:
Computer forensic is the practice of collecting, analyzing, and reporting digital evidence in a way that is legally admissible in open court. Network forensics, an offset of computer forensic, is mainly concerned with the monitoring and analysis of network traffic, both local and WAN/internet, in order to identify security incidents and to investigate fraud or network misuse. In this chapter, the authors discuss challenges in creating high-speed network forensic tools and propose NetTrack, a tamper-proof device aimed to produce evidences with probative value via digital signatures for the network traffic. Since digitally signing each IP packet is not efficient, the authors used a specific technique exploiting the Merkle trees to create digital signatures for flows and multicasts and implemented it by using an optimized algorithm for Merkle tree traversal to save space and time. Through experiments, the authors show NetTrack signing is fast as it can produce digital evidence within a short time.
APA, Harvard, Vancouver, ISO, and other styles
9

Carlton, Gregory H., and Hill Zhou. "A Survey of Cloud Computing Challenges from a Digital Forensics Perspective." In Advancements and Innovations in Wireless Communications and Network Technologies, 213–28. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2154-1.ch016.

Full text
Abstract:
Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users’ concerns away from the physical location of system components and toward the accessibility of the system’s services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Saedy, Hasan L. "Cyber Crimes." In Handbook of Research on Threat Detection and Countermeasures in Network Security, 154–68. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6583-5.ch009.

Full text
Abstract:
The financial cost of cyber crime now has an annual cost estimated in the UK in eleven figures. In this chapter an ethic based definition of cyber crime is introduced and cyber crimes are classified. The impact of each class of cyber crime on society, individual, government and international security is highlighted. The cost of cyber crime is evaluated and a technique to prevent and mitigate the effect of these crimes on individual, government and international security and world peace is indicated. The forensic techniques and tools used in cyber crime evidence gathering and prosecuting procedure is also indicated. Finally, recommendations and suggestion are given to mitigate the impact of cyber crime on individuals, societies, world finance and international security.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Network forensic tools"

1

Ghabban, Fahad M., Ibrahim M. Alfadli, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm, and Mahmoud Ahmad Al-Khasawneh. "Comparative Analysis of Network Forensic Tools and Network Forensics Processes." In 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2021. http://dx.doi.org/10.1109/icscee50312.2021.9498226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Narayanan, A. Sankara, and M. Mohamed Ashik. "Computer Forensic First Responder Tools." In 2012 International Conference on Advances in Mobile Network, Communication and its Applications (MNCAPPS). IEEE, 2012. http://dx.doi.org/10.1109/mncapps.2012.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Northrop, Erik E., and Heather R. Lipford. "Exploring the Usability of Open Source Network Forensic Tools." In the 2014 ACM Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2663887.2663903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mate, Mrunal H., and Smita R. Kapse. "Network Forensic Tool -- Concept and Architecture." In 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2015. http://dx.doi.org/10.1109/csnt.2015.204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kelly, Michael D., and Sean J. Geoghegan. "FIRST Forensic Internet Replay Sequencing Tool." In 2009 Eighth IEEE International Symposium on Network Computing and Applications (NCA). IEEE, 2009. http://dx.doi.org/10.1109/nca.2009.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seyitoglu, Efe U. A., Attila A. Yavuz, and Muslum Ozgur Ozmen. "Compact and Resilient Cryptographic Tools for Digital Forensics." In 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 2020. http://dx.doi.org/10.1109/cns48642.2020.9162236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ae Chun, Soon, and Francisco Artigas. "Tide gate sensor network as a forensic tool." In dg.o 2013: 14th Annual International Conference on Digital Government Research. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2479724.2479771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hunt, Ray. "New developments in network forensics — Tools and techniques." In 2012 18th IEEE International Conference on Networks (ICON). IEEE, 2012. http://dx.doi.org/10.1109/icon.2012.6506587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Siddiqui, Ali, Oguntoyinbo Olufunmilayo, Hardik Gohel, and Bishwajeet Pandey. "Digital Healthcare System Vulnerability Analysis using Network Forensic Tool." In 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2021. http://dx.doi.org/10.1109/csnt51715.2021.9509647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malik, Parveen, and Kannan Karthik. "Limitation of PFA-events as a forensic tool." In 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2017. http://dx.doi.org/10.1109/spin.2017.8049940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography