OSINT in the Context of Cyber-Security

F Tabatabaei, D Wells - … Source Intelligence Investigation: From Strategy to …, 2017 - Springer
The impact of cyber-crime has necessitated intelligence and law enforcement agencies
across the world to tackle cyber threats. All sectors are now facing similar dilemmas of how …

A review of scientific research in defensive cyberspace operation tools and technologies

PL Goethals, ME Hunt - Journal of Cyber Security Technology, 2019 - Taylor & Francis
The realm of cybersecurity is perhaps one of the most quickly evolving areas within today's
research space. New and emerging technologies, as well as the growth of cybersecurity …

Context-based access control management in ubiquitous environments

A Corrad, R Montanari, D Tibaldi - Third IEEE International …, 2004 - ieeexplore.ieee.org
Wireless connectivity and the widespread diffusion of portable devices raise new challenges
for ubiquitous service provisioning. Mobility of users causes frequent and unpredictable …

Fourth industrial revolution application: network forensics cloud security issues

AA Khan, AA Laghari, S Awan… - Security Issues and …, 2021 - Wiley Online Library
This chapter studies the cloud security issues in network forensics and a large‐scale
machine‐to‐machine (M2M) communication impact on the fourth industrial revolution. The …

A comparative study of email forensic tools

VK Devendran, H Shahriar… - Journal of …, 2015 - digitalcommons.kennesaw.edu
Over the last decades, email has been the major carrier for transporting spam and malicious
contents over the network. Email is also the primary source of numerous criminal activities …

[HTML][HTML] Digital forensics and cyber crime datamining

KK Sindhu, BB Meshram - 2012 - scirp.org
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital
evidence that has been stored in the digital devices. Various digital tools and techniques are …

Ontology for reactive techniques in digital forensics

D Ellison, RA Ikuesan, HS Venter - 2019 IEEE Conference on …, 2019 - ieeexplore.ieee.org
Techniques applied in response to detrimental digital incidents vary in many respects
according to their attributes. Models of techniques exist in current research but are typically …

[PDF][PDF] Techniques and Tools for Forensic Investigation of E-mail

MT Banday - International Journal of Network Security & Its …, 2011 - Citeseer
ABSTRACT E-mail has emerged as the most important application on Internet for
communication of messages, delivery of documents and carrying out of transactions and is …

Backtracking tool root-tracker to identify true source of cyber crime

PR Yogesh - Procedia Computer Science, 2020 - Elsevier
The main goal of the network forensic tools is to collect legal evidence of cybercrime from
the network environment by capturing, recording and analyzing the network packets. Such …

Digital forensics in the age of smart environments: A survey of recent advancements and challenges

AMR Alenezi - arXiv preprint arXiv:2305.09682, 2023 - arxiv.org
Digital forensics in smart environments is an emerging field that deals with the investigation
and analysis of digital evidence in smart devices and environments. As smart environments …