[PDF][PDF] The Enhanced Forensic Examination and Analysis for Mobile Cloud Platform by Applying Data Mining Methods.

IA Alnajjar, M Mahmuddin - Webology, 2021 - researchgate.net
Investigating the mobile cloud environment is a challenging task due to the characteristics of
voluminous data, dispersion of data, virtualization, and diverse data. Recent research works …

[PDF][PDF] INTEGRATED EXAMINATION AND ANALYSIS MODEL FOR IMPROVING MOBILE CLOUD FORENSIC INVESTIGATION

IA ALNAJJAR - 2022 - etd.uum.edu.my
Advanced forensic techniques become inevitable to investigate the malicious activities in
Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific …

Answering to 5W Using Digital Forensics Data

C Ferrante, B Habibnia - 2021 International Symposium on …, 2021 - ieeexplore.ieee.org
In recent years the increasing capacity of storage devices, the advent of the cloud and the
quantity of email, messages, chats, pictures and files exchanged, led the data to be …

[PDF][PDF] Mining e-mail content for cyber forensic investigation

MSR Khan, MSM Nirkhi… - … International Journal of …, 2012 - researchgate.net
E-mail is a widely used mechanism for communication, due to its cost and expediency.
However, the concern lies when along with its legitimate usage; it is being abused for …

A forensics tool of Foxmail client

L Xie, G Chen - The 2014 2nd International Conference on …, 2014 - ieeexplore.ieee.org
Computer forensics is an important part of the computer crime investigation. So a Forensics
system aimed to Foxmail data analysis and investigation is proposed in this paper. The …

[PDF][PDF] Improved e-mail forensic using dynamic graphs and change-point detection

C Hiller, A Wagner - Applications in Medicine and Manufacturing - d-nb.info
Fraudulent behavior costs the German healthcare system an estimated 14 billion euros per
year. Reasons are, amongst others, criminal networks of nursing services, doctors and …

[PDF][PDF] On the use of data visualization techniques to support digital forensic analysis: A survey of current approaches

GA Hales, RI Ferguson… - … on Cybercrime, Security …, 2012 - researchgate.net
The task of analysis within the digital forensic investigation lifecycle is examined and the
support provided for its constituent activities by a representative sample of forensic tools …

The Role of Visual Analytics in Forensic Analysis of Large Communication Datasets

J Koven - 2019 - search.proquest.com
The forensic investigation of communication datasets which contain unstructured text, social
network information, and metadata is a complex task, it is becoming increasingly important …

A secure data protection strategy

R Sanderson - Network Security, 2011 - Elsevier
Information is the lifeblood of your business. Do you know what information you are holding,
who's holding it and whether it's safe? Information is the lifeblood of your business. Do you …

[PDF][PDF] Email Correlation And Analysis Using Pattern Matching

A IOIT - researchgate.net
Email or Electronic mail is been widely used to exchange messages between people.
Electronic mail or an Email can be personal, commercial, business related messages. These …