Добірка наукової літератури з теми "Browser forensics"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Browser forensics".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Browser forensics"
El-Tayeb, Mahmoud, Ahmed Taha, and Zaki Taha. "Streamed Video Reconstruction for Firefox Browser Forensics." Ingénierie des systèmes d information 26, no. 4 (August 31, 2021): 337–44. http://dx.doi.org/10.18280/isi.260401.
Повний текст джерелаFaiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (March 30, 2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.
Повний текст джерелаUmar, Rusydi, Anton Yudhana, and Muhammad Nur Faiz. "Experimental Analysis of Web Browser Sessions Using Live Forensics Method." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 2951. http://dx.doi.org/10.11591/ijece.v8i5.pp2951-2958.
Повний текст джерелаDaulay, Zikri Sulthoni, and Rini Indrayani. "ANALISIS KEAMANAN BROWSER DALAM BERSOSIAL MEDIA MENGGUNAKAN METODE INSTITUTE OF JUSTICE (NIJ)." Djtechno: Jurnal Teknologi Informasi 3, no. 2 (December 30, 2022): 167–75. http://dx.doi.org/10.46576/djtechno.v3i2.2598.
Повний текст джерелаSarjimin, Herman, and Anton Yudhana. "Perbandingan Tool Forensik pada Mozilla Firefox Private Mode Menggunakan Metode NIST." Jurnal Algoritma 18, no. 1 (November 26, 2021): 283–91. http://dx.doi.org/10.33364/algoritma/v.18-1.873.
Повний текст джерелаKinasih, Ratri Ayunita, Arif Wirawan Muhammad, and Wahyu Adi Prabowo. "Analisis Live Forensics Pada Keamanan Browser Untuk Mencegah Pencurian Akun (Studi Kasus: Facebook dan Instagram)." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 1, 2020): 174–85. http://dx.doi.org/10.31849/digitalzone.v11i2.4678.
Повний текст джерелаSidiq, Muhammad Fajar, and Muhammad Nur Faiz. "Review Tools Web Browser Forensics untuk Mendukung Pencarian Bukti Digital." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 1 (April 23, 2019): 67. http://dx.doi.org/10.26418/jp.v5i1.31430.
Повний текст джерелаPandela, Tomi, and Imam Riadi. "Browser Forensics on Web-based Tiktok Applications." International Journal of Computer Applications 175, no. 34 (December 17, 2020): 47–52. http://dx.doi.org/10.5120/ijca2020920897.
Повний текст джерелаRochmadi, Tri, Imam Riadi, and Yudi Prayudi. "Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser." International Journal of Computer Applications 164, no. 8 (April 17, 2017): 31–37. http://dx.doi.org/10.5120/ijca2017913717.
Повний текст джерелаFanani, Galih, Imam Riadi, and Anton Yudhana. "Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop." JURNAL MEDIA INFORMATIKA BUDIDARMA 6, no. 2 (April 25, 2022): 1263. http://dx.doi.org/10.30865/mib.v6i2.3946.
Повний текст джерелаДисертації з теми "Browser forensics"
Dal, Cero Massimiliano. "sistema server-side di acquisizione forense di contenuti web asincroni." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14895/.
Повний текст джерелаBogen, Alfred Christopher. "Selecting keyword search terms in computer forensics examinations using domain analysis and modeling." Diss., Mississippi State : Mississippi State University, 2006. http://sun.library.msstate.edu/ETD-db/ETD-browse/browse.
Повний текст джерелаJames, Peter. "Secure portable execution and storage environments: A capability to improve security for remote working." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1707.
Повний текст джерелаLin, Bo-Ying, and 林伯穎. "Recovering User’s Activity from Deleted Log Files in Web Browser Forensics." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/tmem5d.
Повний текст джерела國立臺灣大學
電機工程學研究所
105
In today''s era of International Network vigorous development, Internet become an essential tool for every person every day. The most convenient tool for surfing the Internet is the browser, so most used applications by the majority of user of computer are also web browsers. In the large number of network data transmission at the same time, the network has also become a way to help crime. When users use browser, the traces of their browsing are also recorded in the hard drive including history, searching key, cache, cookies, download list, login information, bookmarks etc. These items are stored specified log files of folders, and forensic investigators will be able to obtain evidence as an important source of evidence. This will have a great help for forensic investigators. However, that suspects may delete theses records will cause a large challenge for forensic investigators. In the paper, we analyze useful browsing records for Google Chrome on Windows7, and explore how to recover illegal activity when an illegal person deletes a browsing history. We propose a novel methodology to solve the problem that the browsing history is deleted. The methodology uses simple and free forensics tool, but can achieve good result to recover browsing records.
Частини книг з теми "Browser forensics"
Hassan, Nihad A. "Web Browser and E-mail Forensics." In Digital Forensics Basics, 247–89. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-3838-7_8.
Повний текст джерелаBoucher, Jacques, Kim-Kwang Raymond Choo, and Nhien-An Le-Khac. "Web Browser Forensics—A Case Study with Chrome Browser." In Studies in Big Data, 251–91. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16127-8_8.
Повний текст джерелаNelson, Rebecca, Atul Shukla, and Cory Smith. "Web Browser Forensics in Google Chrome, Mozilla Firefox, and the Tor Browser Bundle." In Studies in Big Data, 219–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23547-5_12.
Повний текст джерелаWarren, Christopher, Eman El-Sheikh, and Nhien-An Le-Khac. "Privacy Preserving Internet Browsers: Forensic Analysis of Browzar." In Computer and Network Security Essentials, 369–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_21.
Повний текст джерелаChetry, Arjun, and Uzzal Sharma. "Analysis of Browsing Activity of Portable Opera Browser in Windows 10 Pro System in VMware Workstation Using Digital Forensics Software." In International Conference on Innovative Computing and Communications, 575–83. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2821-5_48.
Повний текст джерелаGunapriya, Srihitha, Valli Kumari Vatsavayi, and Kalidindi Sandeep Varma. "Forensic Investigation of Tor Bundled Browser." In Advances in Intelligent Systems and Computing, 281–89. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6176-8_31.
Повний текст джерелаVatsavayi, Valli Kumari, and Kalidindi Sandeep Varma. "Retrieving TOR Browser Digital Artifacts for Forensic Evidence." In Advances in Intelligent Systems and Computing, 265–74. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9516-5_23.
Повний текст джерелаAhmed, Adnan, Abdul Rehman Javed, Zunera Jalil, Gautam Srivastava, and Thippa Reddy Gadekallu. "Privacy of Web Browsers: A Challenge in Digital Forensics." In Lecture Notes in Electrical Engineering, 493–504. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8430-2_45.
Повний текст джерелаSaini, Anil, Manoj Singh Gaur, and Vijay Laxmi. "A Taxonomy of Browser Attacks." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 291–313. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch019.
Повний текст джерелаDaniel, Larry E., and Lars E. Daniel. "Internet History (Web and Browser Caching)." In Digital Forensics for Legal Professionals, 213–18. Elsevier, 2012. http://dx.doi.org/10.1016/b978-1-59749-643-8.00031-6.
Повний текст джерелаТези доповідей конференцій з теми "Browser forensics"
Marrington, Andrew, Ibrahim Baggili, Talal Al Ismail, and Ali Al Kaf. "Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers." In 2012 International Conference on Computer Systems and Industrial Informatics (ICCSII). IEEE, 2012. http://dx.doi.org/10.1109/iccsii.2012.6454516.
Повний текст джерелаMahaju, Sweta, and Travis Atkison. "Evaluation of Firefox Browser Forensics Tools." In ACM SE '17: SouthEast Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3077286.3077310.
Повний текст джерелаChiu Huang, Ming-Jung, Yu-Lun Wan, Chang-Po Chiang, and Shiuh-Jeng Wang. "Tor Browser Forensics in Exploring Invisible Evidence." In 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2018. http://dx.doi.org/10.1109/smc.2018.00663.
Повний текст джерелаDija, S., V. Indu, A. Sajeena, and J. A. Vidhya. "A Framework for Browser Forensics in Live Windows Systems." In 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2017. http://dx.doi.org/10.1109/iccic.2017.8524412.
Повний текст джерелаDija, S., J. Ajana, V. Indu, and M. Sabarinath. "Web Browser Forensics for Retrieving Searched Keywords on the Internet." In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021. http://dx.doi.org/10.1109/icac3n53548.2021.9725457.
Повний текст джерелаWU, Zhaoxu, Haibo LUO, Haomin PANG, and Biwu YI. "Research and practice of browser electronic data forensics based on SVM." In Second International Conference on Digital Signal and Computer Communications (DSCC 2022), edited by Sandeep Saxena. SPIE, 2022. http://dx.doi.org/10.1117/12.2641529.
Повний текст джерелаAktepe, Safa, Cihan Varol, and Narasimha Shashidhar. "MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116443.
Повний текст джерелаHariharan, Meenu, Akash Thakar, and Parvesh Sharma. "Forensic Analysis of Private Mode Browsing Artifacts in Portable Web Browsers Using Memory Forensics." In 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS). IEEE, 2022. http://dx.doi.org/10.1109/ic3sis54991.2022.9885379.
Повний текст джерелаGros, Tobias, Richard Dirauf, and Felix Freiling. "Systematic Analysis of Browser History Evidence." In 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2020. http://dx.doi.org/10.1109/sadfe51007.2020.00010.
Повний текст джерелаNalawade, Apurva, Smita Bharne, and Vanita Mane. "Forensic analysis and evidence collection for web browser activity." In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016. http://dx.doi.org/10.1109/icacdot.2016.7877639.
Повний текст джерела