[PDF][PDF] ObE Forensics: Una herramienta para el Análisis Forense de Correos Electrónicos

E Notario, BP de Gallo, M Vegetti - cms.digilab.ucasal.edu.ar
Forensic (Ontology based Email Forensic), una herramienta informática para el análisis
forense de correos electrónicos, basada en una ontología. El objetivo de este trabajo es …

[PDF][PDF] Improving Computer Inspection by Using Forensic Cluster Analysis to Develop the Document

K Israil, CCK Srinivas - 2014 - academia.edu
In present forensic analysis, many bulks of files are usually examined. Data mining is a
process of searching through large amounts of data for patterns recognition. It is a relatively …

[PDF][PDF] Elevating Forensic Investigation System For File Clustering

PD Abhonkar, P Sharma - … Journal of Research in Engineering and …, 2014 - academia.edu
In computer forensic investigation, thousands of files are usually surveyed. Much of the data
in those files consists of formless manuscript, whose investigation by computer examiners is …

A webmail reconstructing method from windows XP memory dumps

F Kong, M Xu, Y Ren, J Xu, H Zhang… - Multimedia and Ubiquitous …, 2013 - Springer
Retrieving the content of webmail from physical memory is one key issue for investigators
because it may provide with useful information. This paper proposes a webmail evidence …

[PDF][PDF] International Journal of Advance Engineering and Research Development

S Bhagwat, A Kawade, P Khambad, S Potale - researchgate.net
Email or Electronic mail is been widely used to exchange messages between people.
Electronic mail or an Email can be personal, commercial, business related messages. These …

[HTML][HTML] IJNSA 3

A Ghafarian, A Mady, K Park - ijcnc.com
Emails are the most common service on the Internet for communication and sending
documents. Email is used not only from computers but also from many other electronic …

[PDF][PDF] E-mail Behavior Profiling based on Attachment Type and Language

O Polatcan, S Mishra, Y Pan - 6th Annual Symposium on Information …, 2011 - academia.edu
Protection of confidential information from insider threat is crucial for any organization. In
particular, compromise of information via email is relatively easy and can go undetected. We …

[PDF][PDF] Relevance Feedback Optimization for Digital Forensic Investigations

AS Hanadi - 2019 - bspace.buid.ac.ae
Digital forensics deals with the use of tools and techniques to preserve, identify, extract,
document, and interpret any data stored or transmitted using a digital system. It is usually …

[PDF][PDF] International Journal of Modern Trends in Engineering and Research

SS Ansari, TM Pattewar - academia.edu
Now days, Forensic analysis is doing crucial job in crime investigation. In earlier, it's
common that use of digital devices like computers is used for the analysis of crimes by …

[PDF][PDF] Email Correlation And Analysis Using Pattern Matching

A IOIT - researchgate.net
Email or Electronic mail is been widely used to exchange messages between people.
Electronic mail or an Email can be personal, commercial, business related messages. These …