Search Results - "Computer Forensic Methods"
-
1
Identity Theft 911 Chief Information Security Officer Speaks at International Breach Security and Computer Forensics Conferences: Data breach, identity theft and cybercrime expert Ondrej Krehel will share computer investigation, cyberdetection and prevention techniques with international law enforcement officers, academics and private security firms. Krehel will discuss network and computer forensic methods and current trends in criminal hacking, breach notification and security incident response
Published: New York PR Newswire Association LLC 14.09.2010Published in PR Newswire (14.09.2010)“…Data breach, identity theft and cybercrime expert Ondrej Krehel will share computer investigation, cyberdetection and prevention techniques with international…”
Get full text
Newsletter -
2
A computer forensic method for detecting timestamp forgery in NTFS
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.05.2013Published in Computers & security (01.05.2013)“…In this paper, we present a computer forensic method for detecting timestamp forgeries in the Windows NTFS file system…”
Get full text
Journal Article -
3
An Intuitive Computer Forensic Method by Timestamp Changing Patterns
Published: IEEE 01.07.2014Published in 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (01.07.2014)“…This proposes an intuitive computer forensic method by timestamp changing patterns of operations on file in Windows NTFS file system…”
Get full text
Conference Proceeding -
4
Adopting Computer Forensics Techniques to Investigate Cyber Incidents in Global Shipping Operations
ISSN: 2182-2069, 2182-2077Published: 30.05.2025Published in Journal of internet services and information security (30.05.2025)“…Due to increasing reliance on information and communication technology (ICT), the global shipping industry which plays a pivotal role in international trade is…”
Get full text
Journal Article -
5
Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime
ISSN: 2008-5893, 2423-5059Published: University of Tehran 01.01.2023Published in Nashrīyah-i mudīrīyat-i fannāvarī-i iṭṭilāʻāt (01.01.2023)“…The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal…”
Get full text
Journal Article -
6
Computer Forensics Method in Analysis of Files Timestamps in Microsoft Windows Operating System and NTFS File System
ISSN: 2074-7128, 2074-7136Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.02.2013Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2013)“…All existing file browsers displays 3 timestamps for every file in file system NTFS. Nowadays there are a lot of utilities that can manipulate temporal…”
Get full text
Journal Article -
7
ANALYSIS OF ANTI COMPUTER FORENSICS TECHNIQUE USING OVERWRITING METADATA METHOD ON DIGITAL EVIDENCE
ISSN: 2620-620X, 2621-9840Published: 05.08.2022Published in Jurnal Algoritma, Logika dan Komputasi (05.08.2022)“… In this study, the anti-computer forensic method that will be analyzed and applied is meta…”
Get full text
Journal Article -
8
Dynamical Network Forensics Based on Immune Agent
ISBN: 9780769528755, 0769528759ISSN: 2157-9555Published: IEEE 01.08.2007Published in Third International Conference on Natural Computation (ICNC 2007) (01.08.2007)“… Comparing with traditional computer forensics methods, the new method provides the capacity that gathering real-time evidence dynamically as soon as network intrusions take place and saving…”
Get full text
Conference Proceeding -
9
Book Review: Computer Forensics: Principles and Practices
ISSN: 1558-7223, 1558-7215, 1558-7223Published: Association of Digital Forensics, Security and Law 2007Published in The journal of digital forensics, security and law (2007)“…€“ including what types exist and where it may be found – and the computer forensics methods to investigate itâ…”
Get full text
Book Review

