[1]
|
Intrusion Detection Network Attacks Based on Whale Optimization Algorithm.
|
|
Ingénierie des Systèmes d …,
2022 |
|
|
[2]
|
Intrusion detection network attacks based on whale optimization algorithm
|
|
Ingenierie des Systemes d' …,
2022 |
|
|
[3]
|
An adaptative and compliant forensics admissibility metrics generation methodology
|
|
The 23rd International Conference on Information …,
2021 |
|
|
[4]
|
Analisa Perkembangan Digital Forensik dalam Penyelidikan Cybercrime di Indonesia (Systematic Review)
|
|
2019 |
|
|
[5]
|
FRAMEWORK FOR ESTABLISHING CONFIDENCE LEVEL OF DIGITAL EVIDENCE ADMISSIBILITY
|
|
2019 |
|
|
[6]
|
A Metric for the Specification of a Consistent Digital Forensic Evidence Extraction Process Model in Mobile Devices
|
|
2019 |
|
|
[7]
|
OntoFoCE: Herramienta para el Análisis Forense de Correos Electrónicos
|
|
2019 |
|
|
[8]
|
Biometrically linking document leakage to the individuals responsible
|
|
Trust, Privacy and Security in Digital Business,
2018 |
|
|
[9]
|
TRACEMAP: A traceability model for the digital forensics investigation process
|
|
2017 |
|
|
[10]
|
Integrirani model upravljanja korporativnom digitalnom forenzičkom istragom
|
|
Tehni?ki vjesnik,
2016 |
|
|
[11]
|
A Generic Framework for Digital Evidence Traceability
|
|
2016 |
|
|
[12]
|
A Review of Intrusion Alerts Correlation Frameworks
|
|
International Journal of Computer Applications Technology and Research,
2016 |
|
|
[13]
|
Design and Research of Hybrid Network Electronic Forensics Model Based on Cloud Computing
|
|
International Journal of Grid and Distributed Computing,
2016 |
|
|
[14]
|
Proactive Evidence Preserving Model for Cybercrime Using Encryption
|
|
2016 |
|
|
[15]
|
Digital Chain of Custody Quality Assessment
|
|
International Journal of Computer Science and Network Security (IJCSNS),
2016 |
|
|
[16]
|
Integrated management model of the corporate digital forensic investigation
|
|
Tehnicki vjesnik/Technical Gazette,
2016 |
|
|
[17]
|
Proposta para integração de laboratórios forenses via rede de weblabs.
|
|
Thesis,
2016 |
|
|
[18]
|
Digital Forensics Tool Interface Visualization
|
|
ProQuest Dissertations Publishing,
2015 |
|
|
[19]
|
Scenario-based design for a cloud forensics portal
|
|
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on,
2015 |
|
|
[20]
|
Towards a Built-In Digital Forensics-Aware Framework for Web Services
|
|
2015 11th International Conference on Computational Intelligence and Security (CIS),
2015 |
|
|
[21]
|
Forensics-aware web services composition and ranking
|
|
iiWAS 2015 Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services,
2015 |
|
|
[22]
|
DIGITAL FORENSIC TECHNOLOGIES AS E-FRAUD RISK MITIGATION TOOLS IN THE BANKING INDUSTRY: EVIDENCE FROM ZIMBABWE
|
|
RISK GOVERNANCE & CONTROL: Financial markets and institutions,
2014 |
|
|
[23]
|
Detecting Information Leakage Based on Subtracting Matrix
|
|
Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on,
2014 |
|
|
[24]
|
How to Get Away with Murder in Marketing: Forensic Marketing
|
|
|
|
|