Forensic investigation of cloud computing systems

M Taylor, J Haggerty, D Gresty, D Lamb - Network Security, 2011 - Elsevier
Cloud computing describes a computing concept where software services, and the
resources they use, operate as (and on) a virtualised platform across many different host …

The state of the art forensic techniques in mobile cloud environment: a survey, challenges and current trends

M Faheem, MT Kechadi, NA Le-Khac - Mobile computing and …, 2016 - igi-global.com
Smartphones have become popular in recent days due to the accessibility of a wide range of
applications. These sophisticated applications demand more computing resources in a …

Enhanced forensic process for improving mobile cloud traceability in cloud-based mobile applications

P Sharma, D Arora, T Sakthivel - Procedia Computer Science, 2020 - Elsevier
Recently, the raPID popularity of smart phones significantly impacts the day-to-day activities
of humans due to the increased access to social media and instant messaging services. The …

Detection of suspicious terrorist emails using text classification: A review

G Mujtaba, L Shuib, RG Raj… - Malaysian Journal of …, 2018 - ojie.um.edu.my
This paper provides a comprehensive review and analysis of the detection of suspicious
terrorist electronic mails (emails) using various phases and methods of text classification …

A forensic email analysis tool using dynamic visualization

J Stadlinger, A Dewald - … of Digital Forensics, Security and Law, 2017 - commons.erau.edu
Communication between people counts to the most important information of today's
business. As a result, in case of forensic investigations in big companies, analysis of …

Toward a new mobile cloud forensic framework

M Faheem, NA Le-Khac… - 2016 sixth international …, 2016 - ieeexplore.ieee.org
Smartphones have created a significant impact on the day-to-day activities of every
individual. Now-a-days a wide range of Smartphone applications are available and it …

A discussion of visualization techniques for the analysis of digital evidence

G Schrenk, R Poisel - 2011 Sixth International Conference on …, 2011 - ieeexplore.ieee.org
Digital crimes are increasing, so is the need for improvements in digital forensics. With the
growth of storage capacity these digital forensic investigations are getting more difficult …

[PDF][PDF] Visualization techniques for digital forensics: a survey

S Chavhan, SM Nirkhi - International journal of advanced computer …, 2012 - Citeseer
Digital crimes is big problem due to large numbers of data access and insufficient attack
analysis techniques so there is the need for improvements in existing digital forensics …

Email visualization correlation analysis forensics research

Z Chen, Y Yang, L Chen, L Wen, J Wang… - 2017 IEEE 4th …, 2017 - ieeexplore.ieee.org
Foxmail client is one of the most popular tools to send and receive e-mail, and the mail data
files preserved in it become an important target of computer investigation and forensics, from …

[PDF][PDF] E-mail data analysis for application to cyber forensic investigation using data mining

SR Khan, SM Nirkhi, RV Dharaskar - Proceedings of the 2nd …, 2013 - researchgate.net
This paper discusses briefly the significance of e-mail communication in today's world, how
substantial e-mails are with respect to obtaining digital evidence. The framework proposed …