Found: 16
Select item for more details and to access through your institution.
A holistic digital forensic analysis of Discord – Storage, memory, and network perspectives.
- Published in:
- Journal of Forensic Sciences, 2024, v. 69, n. 4, p. 1320, doi. 10.1111/1556-4029.15548
- By:
- Publication type:
- Article
Microsoft Teams desktop application forensic investigations utilizing IndexedDB storage.
- Published in:
- Journal of Forensic Sciences, 2022, v. 67, n. 4, p. 1513, doi. 10.1111/1556-4029.15014
- By:
- Publication type:
- Article
A Comprehensive Survey on Artifact Recovery from Social Media Platforms: Approaches and Future Research Directions.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 12, p. 629, doi. 10.3390/info14120629
- By:
- Publication type:
- Article
A Novel Static Analysis Approach Using System Calls for Linux IoT Malware Detection.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 15, p. 2906, doi. 10.3390/electronics13152906
- By:
- Publication type:
- Article
Investigating Digital Forensic Artifacts Generated from 3D Printing Slicing Software: Windows and Linux Analysis.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 14, p. 2864, doi. 10.3390/electronics13142864
- By:
- Publication type:
- Article
Intelligent Threat Detection—AI-Driven Analysis of Honeypot Data to Counter Cyber Threats.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 13, p. 2465, doi. 10.3390/electronics13132465
- By:
- Publication type:
- Article
Linux IoT Malware Variant Classification Using Binary Lifting and Opcode Entropy.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 12, p. 2381, doi. 10.3390/electronics13122381
- By:
- Publication type:
- Article
Magnets to Adversaries—An Analysis of the Attacks on Public Cloud Servers.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 21, p. 4493, doi. 10.3390/electronics12214493
- By:
- Publication type:
- Article
Browser Forensic Investigations of Instagram Utilizing IndexedDB Persistent Storage.
- Published in:
- Future Internet, 2022, v. 14, n. 6, p. 188, doi. 10.3390/fi14060188
- By:
- Publication type:
- Article
Browser Forensic Investigations of WhatsApp Web Utilizing IndexedDB Persistent Storage.
- Published in:
- Future Internet, 2020, v. 12, n. 11, p. 184, doi. 10.3390/fi12110184
- By:
- Publication type:
- Article
BrowStExPlus: A Tool to Aggregate IndexedDB Artifacts for Forensic Analysis.
- Published in:
- Journal of Forensic Sciences, 2019, v. 64, n. 5, p. 1370, doi. 10.1111/1556-4029.14043
- By:
- Publication type:
- Article
In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes.
- Published in:
- Journal of Forensic Sciences, 2016, v. 61, p. S110, doi. 10.1111/1556-4029.12979
- By:
- Publication type:
- Article
Comparison of Pattern Matching Techniques on Identification of Same Family Malware.
- Published in:
- International Journal of Information Security Science, 2015, v. 4, n. 3, p. 104
- By:
- Publication type:
- Article
Real-Time Data Quality Monitoring System for Data Cleansing.
- Published in:
- International Journal of Business Intelligence Research, 2012, v. 3, n. 1, p. 83, doi. 10.4018/jbir.2012010106
- By:
- Publication type:
- Article
EVALUATION OF ORAL AND MAXILLOFACIAL SURGEONS' AND RESEARCH ASISSTANTS' ATTITUDES OF DEFENSIVE DENTISTRY.
- Published in:
- Medical Journal of Suleyman Demirel University, 2022, v. 29, n. 2, p. 153, doi. 10.17343/sdutfd.956882
- By:
- Publication type:
- Article
CANAttack: Assessing Vulnerabilities within Controller Area Network.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 19, p. 8223, doi. 10.3390/s23198223
- By:
- Publication type:
- Article