Journal articles on the topic 'Network forensic tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network forensic tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Adeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (January 2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.
Full textQureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.
Full textHaggerty, John, Alexander J. Karran, David J. Lamb, and Mark Taylor. "A Framework for the Forensic Investigation of Unstructured Email Relationship Data." International Journal of Digital Crime and Forensics 3, no. 3 (July 2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.
Full textMontgomery, Jacob M., Santiago Olivella, Joshua D. Potter, and Brian F. Crisp. "An Informed Forensics Approach to Detecting Vote Irregularities." Political Analysis 23, no. 4 (2015): 488–505. http://dx.doi.org/10.1093/pan/mpv023.
Full textArévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas, and Gustavo Adolfo Higuera Castro. "Forensic analysis with hacking tools on android devices." Visión electrónica 13, no. 1 (January 31, 2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.
Full textBintang, Rauhulloh Noor, Rusydi Umar, and Anton Yudhana. "Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method." Scientific Journal of Informatics 8, no. 1 (May 10, 2021): 1–9. http://dx.doi.org/10.15294/sji.v8i1.26744.
Full textGhannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.
Full textRaman, Jayakrishnan Anilakkad, and Vasanthi Varadharajan. "HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics." Ingénierie des systèmes d information 26, no. 3 (June 30, 2021): 319–27. http://dx.doi.org/10.18280/isi.260309.
Full textYasin, Firmansyah, Abdul Fadlil, and Rusydi Umar. "Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (February 20, 2021): 91–98. http://dx.doi.org/10.29207/resti.v5i1.2784.
Full textRiadi, Imam, Sunardi Sunardi, and Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics." Jurnal Teknik Elektro 10, no. 1 (June 20, 2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.
Full textHaggerty, John, Sheryllynne Haggerty, and Mark Taylor. "Forensic triage of email network narratives through visualisation." Information Management & Computer Security 22, no. 4 (October 7, 2014): 358–70. http://dx.doi.org/10.1108/imcs-11-2013-0080.
Full textAnton Yudhana, Abdul Fadlil, and Muhammad Rizki Setyawan. "Analysis of Skype Digital Evidence Recovery based on Android Smartphones Using the NIST Framework." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 4 (August 17, 2020): 682–90. http://dx.doi.org/10.29207/resti.v4i4.2093.
Full textOura, Petteri, Alina Junno, and Juho-Antti Junno. "Deep learning in forensic gunshot wound interpretation—a proof-of-concept study." International Journal of Legal Medicine 135, no. 5 (April 6, 2021): 2101–6. http://dx.doi.org/10.1007/s00414-021-02566-3.
Full textCharette, Yanick, Ilvy Goossens, Michael C. Seto, Tonia L. Nicholls, and Anne G. Crocker. "Is Knowledge Contagious? Diffusion of Violence-Risk-Reporting Practices Across Clinicians’ Professional Networks." Clinical Psychological Science 9, no. 2 (February 5, 2021): 284–93. http://dx.doi.org/10.1177/2167702620954797.
Full textHersyah, Mohammad Hafiz. "A Proposed Model of Digital Forensic on Cloud Computing Security Infrastructure." International Journal of Innovation in Enterprise System 2, no. 02 (July 30, 2018): 18–23. http://dx.doi.org/10.25124/ijies.v2i02.21.
Full textUsov, A. I., O. B. Gradusova, and S. A. Kuz’min. "The Use of Probabilistic and Statistical Methods to Test the Significance of Scientific Evidence: Comparative Analysis of Current Forensic Practices in Russia and Abroad." Theory and Practice of Forensic Science 13, no. 4 (December 27, 2018): 6–15. http://dx.doi.org/10.30764/1819-2785-2018-13-4-6-15.
Full textPurnomo, Arif D., Charles Lim, and Burman Noviansyah. "Threat Hunting Early Experiment through Event Correlation and Memory Forensic." ACMIT Proceedings 6, no. 1 (July 6, 2021): 56–63. http://dx.doi.org/10.33555/acmit.v6i1.98.
Full textKotwal, Shallu, and Jatinder Manhas. "Investigation of Different Constraints in Cybercrime & Digital Forensics." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 222. http://dx.doi.org/10.23956/ijarcsse/v7i7/0209.
Full textGinanjar, Aseh, Nur Widiyasono, and Rohmat Gunawan. "WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD." Jurnal Terapan Teknologi Informasi 2, no. 2 (February 27, 2019): 59–69. http://dx.doi.org/10.21460/jutei.2018.22.111.
Full textAli, Md Iman, and Sukhkirandeep Kaur. "Next-Generation Digital Forensic Readiness BYOD Framework." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6664426.
Full textRENNA, L., and F. BRANDIZZI. "The mysterious life of the plant trans‐Golgi network: advances and tools to understand it better." Journal of Microscopy 278, no. 3 (March 20, 2020): 154–63. http://dx.doi.org/10.1111/jmi.12881.
Full textRiadi, Imam, Rusdy Umar, and Dora Bernadisman. "Analisis Forensik Database Menggunakan Metode Forensik Statis." JURNAL SISTEM INFORMASI BISNIS 9, no. 1 (May 3, 2019): 9. http://dx.doi.org/10.21456/vol9iss1pp9-17.
Full textNøkleberg, Martin. "Examining the how of Plural Policing: Moving from Normative Debate to Empirical Enquiry." British Journal of Criminology 60, no. 3 (January 11, 2020): 681–702. http://dx.doi.org/10.1093/bjc/azz080.
Full textThant, Yee Mon. "IoT Security: Simulation and Analysis of TCP SYN Flooded DDOS Attack using WireShark." Transactions on Networks and Communications 8, no. 3 (June 30, 2020): 16–25. http://dx.doi.org/10.14738/tnc.83.8389.
Full textKazemi, Seyyed Sajjad, and Sajjad Heidari. "Digital forensics and its role in promoting criminal prosecution." Revista Eletrônica em Gestão, Educação e Tecnologia Ambiental 25 (March 22, 2021): e5. http://dx.doi.org/10.5902/2236117063798.
Full textSabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.
Full textNadim, Mohammad, Wonjun Lee, and David Akopian. "Characteristic Features of the Kernel-level Rootkit for Learning-based Detection Model Training." Electronic Imaging 2021, no. 3 (June 18, 2021): 34–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-034.
Full textHe, Tuo, João Marco, Richard Soares, Yafang Yin, and Alex Wiedenhoeft. "Machine Learning Models with Quantitative Wood Anatomy Data Can Discriminate between Swietenia macrophylla and Swietenia mahagoni." Forests 11, no. 1 (December 25, 2019): 36. http://dx.doi.org/10.3390/f11010036.
Full textRetamero, Juan Antonio, Jose Aneiros-Fernandez, and Raimundo G. del Moral. "Complete Digital Pathology for Routine Histopathology Diagnosis in a Multicenter Hospital Network." Archives of Pathology & Laboratory Medicine 144, no. 2 (July 11, 2019): 221–28. http://dx.doi.org/10.5858/arpa.2018-0541-oa.
Full textAkremi, Aymen, Hassen Sallay, Mohsen Rouached, and Rafik Bouaziz. "Applying Digital Forensics to Service Oriented Architecture." International Journal of Web Services Research 17, no. 1 (January 2020): 17–42. http://dx.doi.org/10.4018/ijwsr.2020010102.
Full textBiałczak, Piotr, and Wojciech Mazurczyk. "Characterizing Anomalies in Malware-Generated HTTP Traffic." Security and Communication Networks 2020 (September 1, 2020): 1–26. http://dx.doi.org/10.1155/2020/8848863.
Full textPrakash, Vijay, Alex Williams, Lalit Garg, Claudio Savaglio, and Seema Bawa. "Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems." Electronics 10, no. 11 (May 21, 2021): 1229. http://dx.doi.org/10.3390/electronics10111229.
Full textZeng, Gang. "Data Handling of Digital Forensics Cloud Computing." Advanced Materials Research 756-759 (September 2013): 1739–43. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1739.
Full textLopez-Araiza, Christopher, and Ebru Celikel Cankaya. "A Comprehensive Analysis of Security Tools for Network Forensics." Journal of Medical - Clinical Research & Reviews 1, no. 3 (December 30, 2017): 1–9. http://dx.doi.org/10.33425/2639-944x.1021.
Full textHunt, Ray, and Sherali Zeadally. "Network Forensics: An Analysis of Techniques, Tools, and Trends." Computer 45, no. 12 (December 2012): 36–43. http://dx.doi.org/10.1109/mc.2012.252.
Full textDemertzis, Konstantinos, Konstantinos Tsiknas, Dimitrios Takezis, Charalabos Skianis, and Lazaros Iliadis. "Darknet Traffic Big-Data Analysis and Network Management for Real-Time Automating of the Malicious Intent Detection Process by a Weight Agnostic Neural Networks Framework." Electronics 10, no. 7 (March 25, 2021): 781. http://dx.doi.org/10.3390/electronics10070781.
Full textJahankhani, Hamid. "Criminal investigation and forensic tools for smartphones." International Journal of Electronic Security and Digital Forensics 2, no. 4 (2009): 387. http://dx.doi.org/10.1504/ijesdf.2009.027671.
Full textDemertzis, Konstantinos, Panayiotis Kikiras, Nikos Tziritas, Salvador Sanchez, and Lazaros Iliadis. "The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence." Big Data and Cognitive Computing 2, no. 4 (November 22, 2018): 35. http://dx.doi.org/10.3390/bdcc2040035.
Full textHollomotz, Andrea, and Seraina Caviezel Schmitz. "Forio: a Swiss treatment program for young sex offenders with intellectual disabilities." Journal of Intellectual Disabilities and Offending Behaviour 9, no. 3 (September 10, 2018): 117–27. http://dx.doi.org/10.1108/jidob-05-2018-0007.
Full textFerreira, Sara, Mário Antunes, and Manuel E. Correia. "A Dataset of Photos and Videos for Digital Forensics Analysis Using Machine Learning Processing." Data 6, no. 8 (August 5, 2021): 87. http://dx.doi.org/10.3390/data6080087.
Full textMonzon, Federico A., and Tracie J. Koen. "Diagnosis of Metastatic Neoplasms: Molecular Approaches for Identification of Tissue of Origin." Archives of Pathology & Laboratory Medicine 134, no. 2 (February 1, 2010): 216–24. http://dx.doi.org/10.5858/134.2.216.
Full textJones, Andrew, and Stilianos Vidalis. "Rethinking Digital Forensics." Annals of Emerging Technologies in Computing 3, no. 2 (April 1, 2019): 41–53. http://dx.doi.org/10.33166/aetic.2019.02.005.
Full textSeo, Jungtaek, Seokjun Lee, and Taeshik Shon. "A study on memory dump analysis based on digital forensic tools." Peer-to-Peer Networking and Applications 8, no. 4 (June 21, 2013): 694–703. http://dx.doi.org/10.1007/s12083-013-0217-3.
Full textPluskal, Jan, Frank Breitinger, and Ondřej Ryšavý. "Netfox detective: A novel open-source network forensics analysis tool." Forensic Science International: Digital Investigation 35 (December 2020): 301019. http://dx.doi.org/10.1016/j.fsidi.2020.301019.
Full textSalamh, Fahad E., Mohammad Meraj Mirza, and Umit Karabiyik. "UAV Forensic Analysis and Software Tools Assessment: DJI Phantom 4 and Matrice 210 as Case Studies." Electronics 10, no. 6 (March 19, 2021): 733. http://dx.doi.org/10.3390/electronics10060733.
Full textGeiger, M., and L. F. Cranor. "Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools." IEEE Security & Privacy Magazine 4, no. 5 (September 2006): 16–25. http://dx.doi.org/10.1109/msp.2006.132.
Full textKim, Hyungchan, Sungbum Kim, Yeonghun Shin, Wooyeon Jo, Seokjun Lee, and Taeshik Shon. "Ext4 and XFS File System Forensic Framework Based on TSK." Electronics 10, no. 18 (September 20, 2021): 2310. http://dx.doi.org/10.3390/electronics10182310.
Full textBerte, Rosamaria, Fabio Dellutri, Antonio Grillo, Alessandro Lentini, Gianluigi Me, and Vittorio Ottaviani. "Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm." International Journal of Electronic Security and Digital Forensics 2, no. 1 (2009): 18. http://dx.doi.org/10.1504/ijesdf.2009.023872.
Full textBorges, Bruno Carramaschi, Gustavo Macedo de Mello Baptista, and Paulo Roberto Meneses. "Identificação de Áreas Hidromórficas, por meio de Análise Espectral de Dados de Sensoriamento Remoto, como Subsídio para a Elaboração de Laudos Periciais de Avaliação de Imóveis Rurais (Identification of Hydromorphic Areas by Means of Spectral Analysis…)." Revista Brasileira de Geografia Física 7, no. 6 (February 25, 2015): 1062. http://dx.doi.org/10.26848/rbgf.v7.6.p1062-1077.
Full textDahbur, Kamal, and Bassil Mohammad. "Toward Understanding the Challenges and Countermeasures in Computer Anti-Forensics." International Journal of Cloud Applications and Computing 1, no. 3 (July 2011): 22–35. http://dx.doi.org/10.4018/ijcac.2011070103.
Full text