Search Results - "Computer Forensic Methods"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2

    A computer forensic method for detecting timestamp forgery in NTFS by Cho, Gyu-Sang

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.05.2013
    Published in Computers & security (01.05.2013)
    “…In this paper, we present a computer forensic method for detecting timestamp forgeries in the Windows NTFS file system…”
    Get full text
    Journal Article
  3. 3

    An Intuitive Computer Forensic Method by Timestamp Changing Patterns by Gyu-Sang Cho

    Published: IEEE 01.07.2014
    “…This proposes an intuitive computer forensic method by timestamp changing patterns of operations on file in Windows NTFS file system…”
    Get full text
    Conference Proceeding
  4. 4

    Adopting Computer Forensics Techniques to Investigate Cyber Incidents in Global Shipping Operations by Balasubramanian, Ramesh, N, Anand

    ISSN: 2182-2069, 2182-2077
    Published: 30.05.2025
    “…Due to increasing reliance on information and communication technology (ICT), the global shipping industry which plays a pivotal role in international trade is…”
    Get full text
    Journal Article
  5. 5

    Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime by Serhii Drobotov, Roman Pertsev, Mariia Hrab, Vasyl Fedytnyk, Svitlana Moroz, Mariia Kikalishvili

    ISSN: 2008-5893, 2423-5059
    Published: University of Tehran 01.01.2023
    “…The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal…”
    Get full text
    Journal Article
  6. 6

    Computer Forensics Method in Analysis of Files Timestamps in Microsoft Windows Operating System and NTFS File System by Vesta Sergeevna Matveeva, Alexander Vladimirovich Mamaev

    ISSN: 2074-7128, 2074-7136
    Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.02.2013
    “…All existing file browsers displays 3 timestamps for every file in file system NTFS. Nowadays there are a lot of utilities that can manipulate temporal…”
    Get full text
    Journal Article
  7. 7

    ANALYSIS OF ANTI COMPUTER FORENSICS TECHNIQUE USING OVERWRITING METADATA METHOD ON DIGITAL EVIDENCE by Saputra, Julian, Ginting, Jusia Amanda

    ISSN: 2620-620X, 2621-9840
    Published: 05.08.2022
    Published in Jurnal Algoritma, Logika dan Komputasi (05.08.2022)
    “… In this study, the anti-computer forensic method that will be analyzed and applied is meta…”
    Get full text
    Journal Article
  8. 8

    Dynamical Network Forensics Based on Immune Agent by Diangang Wang, Tao Li, Sunjun Liu, Jianhua Zhang, Caiming Liu

    ISBN: 9780769528755, 0769528759
    ISSN: 2157-9555
    Published: IEEE 01.08.2007
    “… Comparing with traditional computer forensics methods, the new method provides the capacity that gathering real-time evidence dynamically as soon as network intrusions take place and saving…”
    Get full text
    Conference Proceeding
  9. 9

    Book Review: Computer Forensics: Principles and Practices by Kessler, Gary

    ISSN: 1558-7223, 1558-7215, 1558-7223
    Published: Association of Digital Forensics, Security and Law 2007
    “…€“ including what types exist and where it may be found – and the computer forensics methods to investigate itâ…”
    Get full text
    Book Review