-
41
-
42
Proposed computer forensic approach for cloud computing environment
Published 2016“…Therefore, this paper discusses in detail the proposed computer forensic approach.…”
Article -
43
-
44
The Significance of Computer Forensics in Electronic Documents as Evidence in Criminal Law
Published 2023-08-01Subjects: “…computer forensics…”
Get full text
Article -
45
An ordered selective imaging and distributed analysis computer forensics model
Published 2014“…The traditional computer forensics procedures and tools collect and analyze the entire user data. …”
Get full text
Article -
46
Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems
Published 2021-05-01Subjects: Get full text
Article -
47
-
48
A model for validation and verification of disk imaging in computer forensic investigation
Published 2009“…Moreover, guideline of validation and verification in computer forensic tools provides a great opportunity for computer forensic practitioners to remove necessity for developing individual tests for tools. …”
Get full text
Thesis -
49
Сlassification of methods of production of computer forensic by usage approach of graph theory
Published 2016-06-01Subjects: “…computer forensic…”
Get full text
Article -
50
Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation
Published 2015“…Computer forensics and privacy protection fields are two conflicting directions in computer security. …”
Get full text
Article -
51
-
52
Computer Forensics Method in Analysis of Files Timestamps in Microsoft Windows Operating System and NTFS File System
Published 2013-02-01Subjects: Get full text
Article -
53
-
54
-
55
PENGGUNAAN ALAT BUKTI DIGITAL DALAM KOMPUTER FORENSIK PADA PENYIDIKAN TINDAK PIDANA MAYANTARA DI DIREKTORAT KRIMINAL KHUSUS POLDA SUMBAR
Published 2019-03-01Subjects: Get full text
Article -
56
Choosing a password breaking strategy with imposed time restrictions
Published 2019-03-01Subjects: Get full text
Article -
57
Rectification and Super-Resolution Enhancements for Forensic Text Recognition
Published 2020-10-01Subjects: Get full text
Article -
58
Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments
Published 2022-09-01Subjects: Get full text
Article -
59
Method for investigating computer incidents based on attribute clustering
Published 2018-09-01Subjects: “…сlustering, internal audit, computer forensics, computer incident, information security.…”
Get full text
Article -
60
Development of an Open Source Tool and a Multi-Platform for Generation of Forensic Reports
Published 2020-08-01Subjects: “…computer forensics…”
Get full text
Article