Výsledky vyhledávání - "Computer forensic timeline"
-
1
Autoři:
Zdroj: Digital Investigation. The International Journal of Digital Forensics and Incident Response. 6(Supplement 1):78-87
Témata: Computer forensic timeline, Event visualization, E-fraud, Timestamp, Chronological evidence, Time Variable, Time determination
Popis souboru: electronic
-
2
Autoři:
Přispěvatelé:
Zdroj: http://www.sans.org/reading-room/whitepapers/logging/computer-forensic-timeline-analysis-tapestry-33836/.
Dostupnost: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.419.1954
http://www.sans.org/reading-room/whitepapers/logging/computer-forensic-timeline-analysis-tapestry-33836/ -
3
Autoři:
Přispěvatelé:
Zdroj: http://www.sans.org/reading-room/whitepapers/incident/computer-forensic-timeline-analysis-tapestry-33836/.
Dostupnost: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.4973
http://www.sans.org/reading-room/whitepapers/incident/computer-forensic-timeline-analysis-tapestry-33836/ -
4
Autoři: a další
Zdroj: Multimedia Tools & Applications; Dec2019, Vol. 78 Issue 23, p32779-32804, 26p
-
5
Autoři:
Zdroj: IET Information Security (Wiley-Blackwell); May2019, Vol. 13 Issue 3, p201-212, 12p
-
6
Autoři:
Zdroj: 2016 International Conference on Computational Techniques in Information & Communication Technologies (ICCTICT); 2016, p243-250, 8p
-
7
Autoři: Lipka, Richard
Zdroj: 2016 9th International Conference on Human System Interactions (HSI); 2016, p150-156, 7p
-
8
Přispěvatelé: The Pennsylvania State University CiteSeerX Archives
Zdroj: http://www.sans.org/reading-room/whitepapers/incident/computer-forensic-timeline-analysis-tapestry-33836/.
Témata: WV
Dostupnost: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.643.2988
http://www.sans.org/reading-room/whitepapers/incident/computer-forensic-timeline-analysis-tapestry-33836/ -
9
Přispěvatelé: The Pennsylvania State University CiteSeerX Archives
Zdroj: http://www.sans.org/reading-room/whitepapers/logging/computer-forensic-timeline-analysis-tapestry-33836/.
Témata: WV
Dostupnost: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.141
http://www.sans.org/reading-room/whitepapers/logging/computer-forensic-timeline-analysis-tapestry-33836/ -
10
Přispěvatelé: The Pennsylvania State University CiteSeerX Archives
Zdroj: http://www.sans.org/reading-room/whitepapers/forensics/computer-forensic-timeline-analysis-tapestry-33836/.
Témata: WV
Dostupnost: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.637.117
http://www.sans.org/reading-room/whitepapers/forensics/computer-forensic-timeline-analysis-tapestry-33836/ -
11
Přispěvatelé: The Pennsylvania State University CiteSeerX Archives
Zdroj: http://www.sans.org/reading-room/whitepapers/forensics/computer-forensic-timeline-analysis-tapestry-33836/.
Témata: WV
Dostupnost: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.593.6751
http://www.sans.org/reading-room/whitepapers/forensics/computer-forensic-timeline-analysis-tapestry-33836/ -
12
Autoři: a další
Zdroj: 2015 ICOHTEC/IEEE International History of High-Technologies & their Socio-Cultural Contexts Conference (HISTELCON); 2015, p404-410, 7p
-
13
Zdroj: Handbook of Digital Forensics of Multimedia Data & Devices; 2015, p305-327, 23p
-
14
Autoři: Gyu-Sang Cho
Zdroj: International Journal of Digital Crime & Forensics; Jul-Sep2016, Vol. 8 Issue 3, p11-33, 23p
-
15
Autoři: a další
Zdroj: 9th International Conference for Internet Technology & Secured Transactions (ICITST-2014); 2014, p157-162, 6p
-
16
Autoři: a další
Zdroj: Advances in Digital Forensics X; 2014, p297-307, 11p
-
17
Autoři: a další
Zdroj: Multimedia Tools & Applications; Jan2014, Vol. 68 Issue 2, p479-496, 18p
-
18
Autoři:
Zdroj: Information Security Journal: A Global Perspective; 2014, Vol. 23 Issue 1/2, p32-44, 13p
-
19
Autoři: a další
Zdroj: International Journal of Digital Crime & Forensics; Jul-Sep2012, Vol. 4 Issue 3, p33-46, 14p
-
20
Autoři:
Zdroj: International Journal of Ambient Computing & Intelligence; Apr-Jun2012, Vol. 4 Issue 2, p35-47, 13p
Full Text Finder
Nájsť tento článok vo Web of Science