Digital forensics subdomains: the state of the art and future directions

A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …

A review of scientific research in defensive cyberspace operation tools and technologies

PL Goethals, ME Hunt - Journal of Cyber Security Technology, 2019 - Taylor & Francis
The realm of cybersecurity is perhaps one of the most quickly evolving areas within today's
research space. New and emerging technologies, as well as the growth of cybersecurity …

A Detection and Investigation Model for the Capture and Analysis of Network Crimes

IS Alansari - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Investigation in the field of network forensics involves examining network traffic to identify,
capture, preserve, reconstruct, analyze, and document network crimes. Although there are …

[PDF][PDF] Digital Forensics Subdomains: The State of the art and Future Directions

R Choo, BAS Al-rimy, ARA Alsewari - core.ac.uk
For reliable and relevant scientific evidence to be admitted in a court of law, it is important to
apply digital forensic investigation techniques to corroborate a suspected potential security …

[HTML][HTML] Sistema de gestión de comunicaciones para evaluar riesgos de seguridad

YA Toro Flores, FU Rivas Almonte… - Revista Universidad y …, 2019 - scielo.sld.cu
En los últimos años, los problemas de seguridad en redes o ciber-ataques están
aumentando de forma exponencial en su faceta de sustracción de información confidencial …

[PDF][PDF] Effective ways of Carrying Out Network Autopsy

LO Gyamfi - 2022 - researchgate.net
By focusing on intrinsic network weaknesses and communication processes, network
forensics techniques aid in the tracking of internal and external network attacks. However …

[PDF][PDF] 11COMMUNICATIONS MANAGEMENT SYSTEM TO ASSESS SECURITY RISKS

DECPE DE GESTIÓN, R DE - CONSEJO EDITORIAL, 2019 - rus.ucf.edu.cu
In the article is made the evaluation of the traffic and the security in the network is made
starting from the methodology of computer security of Benson (2001), fordetail each of its …

[PDF][PDF] 11COMMUNICATIONS MANAGEMENT SYSTEM TO ASSESS SECURITY RISKS DE GESTIÓN DE COMUNICACIONES PARA EVALUAR RIESGOS DE

YAT Flores, FUR Almonte, OT Gebera, LC Paz - 2019 - academia.edu
En el artículo se realiza la evaluación del tráfico y la seguridad en la red a partir de la
metodología de seguridad informática de Benson (2001), para detallar cada una de sus …

[引用][C] An Overview of Network Forensics Model and It's Technologies

B Kochar, A Sandhu