Showing 41 - 60 results of 110 for search '"computer forensics"', query time: 0.11s Refine Results
  1. 41
  2. 42

    Proposed computer forensic approach for cloud computing environment by Ahmed, M., Samy, G. N., Maarop, N., Shanmugam, B., Magalingam, P., Ahmad, R.

    Published 2016
    “…Therefore, this paper discusses in detail the proposed computer forensic approach.…”
    Article
  3. 43
  4. 44
  5. 45

    An ordered selective imaging and distributed analysis computer forensics model by Halboob, Waleed, Mahmod, Ramlan, Udzir, Nur Izura, Abdullah @ Selimun, Mohd Taufik, Deghantanha, Ali

    Published 2014
    “…The traditional computer forensics procedures and tools collect and analyze the entire user data. …”
    Get full text
    Article
  6. 46
  7. 47
  8. 48

    A model for validation and verification of disk imaging in computer forensic investigation by Palaniappan, P. Siva Shamala

    Published 2009
    “…Moreover, guideline of validation and verification in computer forensic tools provides a great opportunity for computer forensic practitioners to remove necessity for developing individual tests for tools. …”
    Get full text
    Thesis
  9. 49
  10. 50

    Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation by Halboob, Waleed Abduljabbar Mohammed, Mahmod, Ramlan, Udzir, Nur Izura, Abdullah @ Selimun, Mohd Taufik

    Published 2015
    “…Computer forensics and privacy protection fields are two conflicting directions in computer security. …”
    Get full text
    Article
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55
  16. 56
  17. 57
  18. 58
  19. 59

    Method for investigating computer incidents based on attribute clustering by Igor S. Pantiukhin, Nikita K. Druzhinin, Lev S. Titov, Alexandr A. Kapitonov, Alisa A. Vorobeva

    Published 2018-09-01
    Subjects: “…сlustering, internal audit, computer forensics, computer incident, information security.…”
    Get full text
    Article
  20. 60