Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Computer Forensics). Showing records 1 – 30 of 125 total matches.

[1] [2] [3] [4] [5]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Rochester Institute of Technology

1. Noorulla, Emad Sayed. Web Browser Private Mode Forensics Analysis.

Degree: Department of Computing Security (GCCIS), 2014, Rochester Institute of Technology

  To maintain privacy of the end consumers the browser vendors provide a very good feature on the browser called the "Private Mode". As per… (more)

Subjects/Keywords: Computer security; Forensics; Web browser forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Noorulla, E. S. (2014). Web Browser Private Mode Forensics Analysis. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8451

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Noorulla, Emad Sayed. “Web Browser Private Mode Forensics Analysis.” 2014. Thesis, Rochester Institute of Technology. Accessed February 23, 2020. https://scholarworks.rit.edu/theses/8451.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Noorulla, Emad Sayed. “Web Browser Private Mode Forensics Analysis.” 2014. Web. 23 Feb 2020.

Vancouver:

Noorulla ES. Web Browser Private Mode Forensics Analysis. [Internet] [Thesis]. Rochester Institute of Technology; 2014. [cited 2020 Feb 23]. Available from: https://scholarworks.rit.edu/theses/8451.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Noorulla ES. Web Browser Private Mode Forensics Analysis. [Thesis]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/8451

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Edith Cowan University

2. Brand, Murray. Analysis avoidance techniques of malicious software.

Degree: 2010, Edith Cowan University

 Anti Virus (AV) software generally employs signature matching and heuristics to detect the presence of malicious software (malware). The generation of signatures and determination of… (more)

Subjects/Keywords: malware; digital forensics; anti-forensics; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brand, M. (2010). Analysis avoidance techniques of malicious software. (Thesis). Edith Cowan University. Retrieved from https://ro.ecu.edu.au/theses/138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Brand, Murray. “Analysis avoidance techniques of malicious software.” 2010. Thesis, Edith Cowan University. Accessed February 23, 2020. https://ro.ecu.edu.au/theses/138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Brand, Murray. “Analysis avoidance techniques of malicious software.” 2010. Web. 23 Feb 2020.

Vancouver:

Brand M. Analysis avoidance techniques of malicious software. [Internet] [Thesis]. Edith Cowan University; 2010. [cited 2020 Feb 23]. Available from: https://ro.ecu.edu.au/theses/138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Brand M. Analysis avoidance techniques of malicious software. [Thesis]. Edith Cowan University; 2010. Available from: https://ro.ecu.edu.au/theses/138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Arizona State University

3. Mabey, Michael Kent. Collaborative Digital Forensics: Architecture, Mechanisms, and Case Study.

Degree: MS, Computer Science, 2011, Arizona State University

 In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and… (more)

Subjects/Keywords: Computer Science; Android forensics; collaborative forensics; digital forensics; forensic framework; YAFFS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mabey, M. K. (2011). Collaborative Digital Forensics: Architecture, Mechanisms, and Case Study. (Masters Thesis). Arizona State University. Retrieved from http://repository.asu.edu/items/9444

Chicago Manual of Style (16th Edition):

Mabey, Michael Kent. “Collaborative Digital Forensics: Architecture, Mechanisms, and Case Study.” 2011. Masters Thesis, Arizona State University. Accessed February 23, 2020. http://repository.asu.edu/items/9444.

MLA Handbook (7th Edition):

Mabey, Michael Kent. “Collaborative Digital Forensics: Architecture, Mechanisms, and Case Study.” 2011. Web. 23 Feb 2020.

Vancouver:

Mabey MK. Collaborative Digital Forensics: Architecture, Mechanisms, and Case Study. [Internet] [Masters thesis]. Arizona State University; 2011. [cited 2020 Feb 23]. Available from: http://repository.asu.edu/items/9444.

Council of Science Editors:

Mabey MK. Collaborative Digital Forensics: Architecture, Mechanisms, and Case Study. [Masters Thesis]. Arizona State University; 2011. Available from: http://repository.asu.edu/items/9444


AUT University

4. Knight, Benjamin Andrew. Mobile devices: iPhone risks and Forensic Tool capability .

Degree: 2011, AUT University

 The research evaluates the capability of software based tools that extract data stored on an Apple iPhone. A literature review is performed covering material on:… (more)

Subjects/Keywords: Forensics; iPhone; Computer forensics; Digital forensics; Tool capability; Mobile devices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Knight, B. A. (2011). Mobile devices: iPhone risks and Forensic Tool capability . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/1196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Knight, Benjamin Andrew. “Mobile devices: iPhone risks and Forensic Tool capability .” 2011. Thesis, AUT University. Accessed February 23, 2020. http://hdl.handle.net/10292/1196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Knight, Benjamin Andrew. “Mobile devices: iPhone risks and Forensic Tool capability .” 2011. Web. 23 Feb 2020.

Vancouver:

Knight BA. Mobile devices: iPhone risks and Forensic Tool capability . [Internet] [Thesis]. AUT University; 2011. [cited 2020 Feb 23]. Available from: http://hdl.handle.net/10292/1196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Knight BA. Mobile devices: iPhone risks and Forensic Tool capability . [Thesis]. AUT University; 2011. Available from: http://hdl.handle.net/10292/1196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cranfield University

5. Morris, Sarah Louise Angela. An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space.

Degree: PhD, 2013, Cranfield University

 This thesis establishes the evidential value of thumbnail cache file fragments identified in unallocated space. A set of criteria to evaluate the evidential value of… (more)

Subjects/Keywords: Computer forensics; Contextual analysis; Cybercrime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morris, S. L. A. (2013). An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/8034 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.585420

Chicago Manual of Style (16th Edition):

Morris, Sarah Louise Angela. “An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space.” 2013. Doctoral Dissertation, Cranfield University. Accessed February 23, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/8034 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.585420.

MLA Handbook (7th Edition):

Morris, Sarah Louise Angela. “An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space.” 2013. Web. 23 Feb 2020.

Vancouver:

Morris SLA. An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space. [Internet] [Doctoral dissertation]. Cranfield University; 2013. [cited 2020 Feb 23]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/8034 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.585420.

Council of Science Editors:

Morris SLA. An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space. [Doctoral Dissertation]. Cranfield University; 2013. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/8034 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.585420

6. Hales, Gavin. Assisting digital forensic analysis via exploratory information visualisation.

Degree: PhD, 2016, Abertay University

 Background: Digital forensics is a rapidly expanding field, due to the continuing advances in computer technology and increases in data stage capabilities of devices. However,… (more)

Subjects/Keywords: Digital forensics; Visualisation; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hales, G. (2016). Assisting digital forensic analysis via exploratory information visualisation. (Doctoral Dissertation). Abertay University. Retrieved from http://hdl.handle.net/10373/2413

Chicago Manual of Style (16th Edition):

Hales, Gavin. “Assisting digital forensic analysis via exploratory information visualisation.” 2016. Doctoral Dissertation, Abertay University. Accessed February 23, 2020. http://hdl.handle.net/10373/2413.

MLA Handbook (7th Edition):

Hales, Gavin. “Assisting digital forensic analysis via exploratory information visualisation.” 2016. Web. 23 Feb 2020.

Vancouver:

Hales G. Assisting digital forensic analysis via exploratory information visualisation. [Internet] [Doctoral dissertation]. Abertay University; 2016. [cited 2020 Feb 23]. Available from: http://hdl.handle.net/10373/2413.

Council of Science Editors:

Hales G. Assisting digital forensic analysis via exploratory information visualisation. [Doctoral Dissertation]. Abertay University; 2016. Available from: http://hdl.handle.net/10373/2413

7. Hales, Gavin. Assisting digital forensic analysis via exploratory information visualisation.

Degree: Doctoral Thesis, Computing and Maths, 2016, Abertay University

 Background: Digital forensics is a rapidly expanding field, due to the continuing advances in computer technology and increases in data stage capabilities of devices. However,… (more)

Subjects/Keywords: Digital forensics; Visualisation; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hales, G. (2016). Assisting digital forensic analysis via exploratory information visualisation. (Thesis). Abertay University. Retrieved from https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hales, Gavin. “Assisting digital forensic analysis via exploratory information visualisation.” 2016. Thesis, Abertay University. Accessed February 23, 2020. https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hales, Gavin. “Assisting digital forensic analysis via exploratory information visualisation.” 2016. Web. 23 Feb 2020.

Vancouver:

Hales G. Assisting digital forensic analysis via exploratory information visualisation. [Internet] [Thesis]. Abertay University; 2016. [cited 2020 Feb 23]. Available from: https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hales G. Assisting digital forensic analysis via exploratory information visualisation. [Thesis]. Abertay University; 2016. Available from: https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. AlMarri, Saeed. A structured approach to malware detection and analysis in digital forensics investigation.

Degree: PhD, 2017, University of Bedfordshire

 Within the World Wide Web (WWW), malware is considered one of the most serious threats to system security with complex system issues caused by malware… (more)

Subjects/Keywords: malware; computer security; digital forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

AlMarri, S. (2017). A structured approach to malware detection and analysis in digital forensics investigation. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/622529

Chicago Manual of Style (16th Edition):

AlMarri, Saeed. “A structured approach to malware detection and analysis in digital forensics investigation.” 2017. Doctoral Dissertation, University of Bedfordshire. Accessed February 23, 2020. http://hdl.handle.net/10547/622529.

MLA Handbook (7th Edition):

AlMarri, Saeed. “A structured approach to malware detection and analysis in digital forensics investigation.” 2017. Web. 23 Feb 2020.

Vancouver:

AlMarri S. A structured approach to malware detection and analysis in digital forensics investigation. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2017. [cited 2020 Feb 23]. Available from: http://hdl.handle.net/10547/622529.

Council of Science Editors:

AlMarri S. A structured approach to malware detection and analysis in digital forensics investigation. [Doctoral Dissertation]. University of Bedfordshire; 2017. Available from: http://hdl.handle.net/10547/622529


Cranfield University

9. Morris, S L A. An Investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space.

Degree: PhD, 2013, Cranfield University

 This thesis establishes the evidential value of thumbnail cache file fragments identified in unallocated space. A set of criteria to evaluate the evidential value of… (more)

Subjects/Keywords: Computer forensics; Contextual analysis; Cybercrime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morris, S. L. A. (2013). An Investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/8034

Chicago Manual of Style (16th Edition):

Morris, S L A. “An Investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space.” 2013. Doctoral Dissertation, Cranfield University. Accessed February 23, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/8034.

MLA Handbook (7th Edition):

Morris, S L A. “An Investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space.” 2013. Web. 23 Feb 2020.

Vancouver:

Morris SLA. An Investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space. [Internet] [Doctoral dissertation]. Cranfield University; 2013. [cited 2020 Feb 23]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/8034.

Council of Science Editors:

Morris SLA. An Investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space. [Doctoral Dissertation]. Cranfield University; 2013. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/8034


Iowa State University

10. Kallal, Benjamin. First Responder Assistance Tool for Mobile Device Forensics.

Degree: 2012, Iowa State University

 The growing importance of mobile telephones, especially so called "smartphones", the problem of identifying these phones has become a real issue. There is a prevalence… (more)

Subjects/Keywords: forensics; mobile device; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kallal, B. (2012). First Responder Assistance Tool for Mobile Device Forensics. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/12358

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kallal, Benjamin. “First Responder Assistance Tool for Mobile Device Forensics.” 2012. Thesis, Iowa State University. Accessed February 23, 2020. https://lib.dr.iastate.edu/etd/12358.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kallal, Benjamin. “First Responder Assistance Tool for Mobile Device Forensics.” 2012. Web. 23 Feb 2020.

Vancouver:

Kallal B. First Responder Assistance Tool for Mobile Device Forensics. [Internet] [Thesis]. Iowa State University; 2012. [cited 2020 Feb 23]. Available from: https://lib.dr.iastate.edu/etd/12358.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kallal B. First Responder Assistance Tool for Mobile Device Forensics. [Thesis]. Iowa State University; 2012. Available from: https://lib.dr.iastate.edu/etd/12358

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Halmstad University

11. Sufiye, Shooresh. Industrial Internet of Things Edge Computing : Edge Forensics.

Degree: Information Technology, 2018, Halmstad University

  Internet of Things (IoT) is an upcoming prominent technology which is quickly growing. Not all IoTdemands of computing resources can be satisfied by cloud,… (more)

Subjects/Keywords: Edge Forensics; Computer Systems; Datorsystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sufiye, S. (2018). Industrial Internet of Things Edge Computing : Edge Forensics. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-41390

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sufiye, Shooresh. “Industrial Internet of Things Edge Computing : Edge Forensics.” 2018. Thesis, Halmstad University. Accessed February 23, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-41390.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sufiye, Shooresh. “Industrial Internet of Things Edge Computing : Edge Forensics.” 2018. Web. 23 Feb 2020.

Vancouver:

Sufiye S. Industrial Internet of Things Edge Computing : Edge Forensics. [Internet] [Thesis]. Halmstad University; 2018. [cited 2020 Feb 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-41390.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sufiye S. Industrial Internet of Things Edge Computing : Edge Forensics. [Thesis]. Halmstad University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-41390

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

12. Adedayo, Oluwasola Mary. Reconstruction in Database Forensics.

Degree: PhD, Computer Science, 2015, University of Pretoria

 The increasing usage of databases in the storage of critical and sensitive information in many organizations has led to an increase in the rate at… (more)

Subjects/Keywords: Computer Science; Digital Forensics; Database Forensics; Digital Forensics Investigation; Forensic analysis; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adedayo, O. M. (2015). Reconstruction in Database Forensics. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/43777

Chicago Manual of Style (16th Edition):

Adedayo, Oluwasola Mary. “Reconstruction in Database Forensics.” 2015. Doctoral Dissertation, University of Pretoria. Accessed February 23, 2020. http://hdl.handle.net/2263/43777.

MLA Handbook (7th Edition):

Adedayo, Oluwasola Mary. “Reconstruction in Database Forensics.” 2015. Web. 23 Feb 2020.

Vancouver:

Adedayo OM. Reconstruction in Database Forensics. [Internet] [Doctoral dissertation]. University of Pretoria; 2015. [cited 2020 Feb 23]. Available from: http://hdl.handle.net/2263/43777.

Council of Science Editors:

Adedayo OM. Reconstruction in Database Forensics. [Doctoral Dissertation]. University of Pretoria; 2015. Available from: http://hdl.handle.net/2263/43777


Halmstad University

13. Bade, Hans. Anti-Forensik : Anti-forensiska metoder på mobila enheter.

Degree: Information Technology, 2018, Halmstad University

Mobiltelefoner har blivit grundläggande för extrahering av digitala artefakter i fo-rensiska utredningar. Androids Linuxbaserade operativsystem medför större möj-ligheter för anti-forensiska metoder, detta gör att… (more)

Subjects/Keywords: Anti-Forensics; Forensics; mobile forensics; Digital Forensics; Anti-forensik; forensik; mobil forensik; mobil anti-forensik; Digital forensik; Computer Engineering; Datorteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bade, H. (2018). Anti-Forensik : Anti-forensiska metoder på mobila enheter. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bade, Hans. “Anti-Forensik : Anti-forensiska metoder på mobila enheter.” 2018. Thesis, Halmstad University. Accessed February 23, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bade, Hans. “Anti-Forensik : Anti-forensiska metoder på mobila enheter.” 2018. Web. 23 Feb 2020.

Vancouver:

Bade H. Anti-Forensik : Anti-forensiska metoder på mobila enheter. [Internet] [Thesis]. Halmstad University; 2018. [cited 2020 Feb 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bade H. Anti-Forensik : Anti-forensiska metoder på mobila enheter. [Thesis]. Halmstad University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

14. Grobler, Cornelia Petronella. DFMF : a digital forensic management framework.

Degree: 2012, University of Johannesburg

D.Phil.(Computer Science)

We are living in an increasingly complex world in which much of society is dependent on technology and its various offshoots and incarnations… (more)

Subjects/Keywords: Computer crimes - Investigation; Forensic sciences; Computer forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grobler, C. P. (2012). DFMF : a digital forensic management framework. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6365

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Grobler, Cornelia Petronella. “DFMF : a digital forensic management framework.” 2012. Thesis, University of Johannesburg. Accessed February 23, 2020. http://hdl.handle.net/10210/6365.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Grobler, Cornelia Petronella. “DFMF : a digital forensic management framework.” 2012. Web. 23 Feb 2020.

Vancouver:

Grobler CP. DFMF : a digital forensic management framework. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2020 Feb 23]. Available from: http://hdl.handle.net/10210/6365.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Grobler CP. DFMF : a digital forensic management framework. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6365

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

15. Gurule, Kaitlyn. An analysis of digital forensic units.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  Technology is growing rapidly. The first computer, ENIAC, was built in 1946 and it was not until 1975 that personal computers existed (Knight, 2014).… (more)

Subjects/Keywords: Information Technology; Applied sciences; Computer forensics; Cybercrime; Cyberforensics; Digital forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gurule, K. (2016). An analysis of digital forensic units. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/948

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gurule, Kaitlyn. “An analysis of digital forensic units.” 2016. Thesis, Purdue University. Accessed February 23, 2020. https://docs.lib.purdue.edu/open_access_theses/948.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gurule, Kaitlyn. “An analysis of digital forensic units.” 2016. Web. 23 Feb 2020.

Vancouver:

Gurule K. An analysis of digital forensic units. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Feb 23]. Available from: https://docs.lib.purdue.edu/open_access_theses/948.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gurule K. An analysis of digital forensic units. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/948

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

16. Flory, Teri A. Digital Forensics in Law Enforcement: A Needs Based Analysis of Indiana Agencies.

Degree: MS, Information Security, 2015, Purdue University

 Cyber crime is a growing problem, with the impact to both businesses and individuals increasing exponentially, but the ability of law enforcement agencies to investigate… (more)

Subjects/Keywords: Computer Forensics; Cybercrime; Digital Evidence; Forensics; Law Enforcement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Flory, T. A. (2015). Digital Forensics in Law Enforcement: A Needs Based Analysis of Indiana Agencies. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1220

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Flory, Teri A. “Digital Forensics in Law Enforcement: A Needs Based Analysis of Indiana Agencies.” 2015. Thesis, Purdue University. Accessed February 23, 2020. https://docs.lib.purdue.edu/open_access_theses/1220.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Flory, Teri A. “Digital Forensics in Law Enforcement: A Needs Based Analysis of Indiana Agencies.” 2015. Web. 23 Feb 2020.

Vancouver:

Flory TA. Digital Forensics in Law Enforcement: A Needs Based Analysis of Indiana Agencies. [Internet] [Thesis]. Purdue University; 2015. [cited 2020 Feb 23]. Available from: https://docs.lib.purdue.edu/open_access_theses/1220.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Flory TA. Digital Forensics in Law Enforcement: A Needs Based Analysis of Indiana Agencies. [Thesis]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_theses/1220

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Australia

17. Lin, Yi-Chi. A study of computer forensics from a cross-cultural perspective: Australia and Taiwan.

Degree: 2008, University of South Australia

 The rise in the number and variety of digital devices has changed all facets of society,from the way we work and communicate to how our… (more)

Subjects/Keywords: computer forensics; culture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2008). A study of computer forensics from a cross-cultural perspective: Australia and Taiwan. (Thesis). University of South Australia. Retrieved from http://arrow.unisa.edu.au:8081/1959.8/48864 ; http://arrow.unisa.edu.au/vital/access/manager/Repository/unisa:35973

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yi-Chi. “A study of computer forensics from a cross-cultural perspective: Australia and Taiwan.” 2008. Thesis, University of South Australia. Accessed February 23, 2020. http://arrow.unisa.edu.au:8081/1959.8/48864 ; http://arrow.unisa.edu.au/vital/access/manager/Repository/unisa:35973.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yi-Chi. “A study of computer forensics from a cross-cultural perspective: Australia and Taiwan.” 2008. Web. 23 Feb 2020.

Vancouver:

Lin Y. A study of computer forensics from a cross-cultural perspective: Australia and Taiwan. [Internet] [Thesis]. University of South Australia; 2008. [cited 2020 Feb 23]. Available from: http://arrow.unisa.edu.au:8081/1959.8/48864 ; http://arrow.unisa.edu.au/vital/access/manager/Repository/unisa:35973.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. A study of computer forensics from a cross-cultural perspective: Australia and Taiwan. [Thesis]. University of South Australia; 2008. Available from: http://arrow.unisa.edu.au:8081/1959.8/48864 ; http://arrow.unisa.edu.au/vital/access/manager/Repository/unisa:35973

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

18. Tentilucci, Matthew Joseph. Secure Acquisition of Digital Evidence from VMware ESXi Hypervisors.

Degree: MS, Information Sciences and Technology, 2015, Penn State University

 The use of computer virtualization technologies has rapidly grown since the early 2000’s. Factors driving this growth include the ever-increasing utilization of cloud computing as… (more)

Subjects/Keywords: Digital Forensics; VMware ESXi; Computer Security; Perl

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tentilucci, M. J. (2015). Secure Acquisition of Digital Evidence from VMware ESXi Hypervisors. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/24944

Chicago Manual of Style (16th Edition):

Tentilucci, Matthew Joseph. “Secure Acquisition of Digital Evidence from VMware ESXi Hypervisors.” 2015. Masters Thesis, Penn State University. Accessed February 23, 2020. https://etda.libraries.psu.edu/catalog/24944.

MLA Handbook (7th Edition):

Tentilucci, Matthew Joseph. “Secure Acquisition of Digital Evidence from VMware ESXi Hypervisors.” 2015. Web. 23 Feb 2020.

Vancouver:

Tentilucci MJ. Secure Acquisition of Digital Evidence from VMware ESXi Hypervisors. [Internet] [Masters thesis]. Penn State University; 2015. [cited 2020 Feb 23]. Available from: https://etda.libraries.psu.edu/catalog/24944.

Council of Science Editors:

Tentilucci MJ. Secure Acquisition of Digital Evidence from VMware ESXi Hypervisors. [Masters Thesis]. Penn State University; 2015. Available from: https://etda.libraries.psu.edu/catalog/24944

19. Hales, Gavin. Assisting digital forensic analysis via exploratory information visualisation.

Degree: PhD, 2016, Abertay University

 Background: Digital forensics is a rapidly expanding field, due to the continuing advances in computer technology and increases in data stage capabilities of devices. However,… (more)

Subjects/Keywords: 363.250285; Digital forensics; Visualisation; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hales, G. (2016). Assisting digital forensic analysis via exploratory information visualisation. (Doctoral Dissertation). Abertay University. Retrieved from https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.693288

Chicago Manual of Style (16th Edition):

Hales, Gavin. “Assisting digital forensic analysis via exploratory information visualisation.” 2016. Doctoral Dissertation, Abertay University. Accessed February 23, 2020. https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.693288.

MLA Handbook (7th Edition):

Hales, Gavin. “Assisting digital forensic analysis via exploratory information visualisation.” 2016. Web. 23 Feb 2020.

Vancouver:

Hales G. Assisting digital forensic analysis via exploratory information visualisation. [Internet] [Doctoral dissertation]. Abertay University; 2016. [cited 2020 Feb 23]. Available from: https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.693288.

Council of Science Editors:

Hales G. Assisting digital forensic analysis via exploratory information visualisation. [Doctoral Dissertation]. Abertay University; 2016. Available from: https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.693288


Iowa State University

20. Xu, Zhen. A dynamic taint forensic analysis tool for Android apps.

Degree: 2017, Iowa State University

 Mobile digital forensic faces numerous problems including a huge amount of data, growing amount of applications and usage of encryption or obfuscation. As a result,… (more)

Subjects/Keywords: Android; Dynamic taint analysis; Forensics; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, Z. (2017). A dynamic taint forensic analysis tool for Android apps. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/16243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xu, Zhen. “A dynamic taint forensic analysis tool for Android apps.” 2017. Thesis, Iowa State University. Accessed February 23, 2020. https://lib.dr.iastate.edu/etd/16243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xu, Zhen. “A dynamic taint forensic analysis tool for Android apps.” 2017. Web. 23 Feb 2020.

Vancouver:

Xu Z. A dynamic taint forensic analysis tool for Android apps. [Internet] [Thesis]. Iowa State University; 2017. [cited 2020 Feb 23]. Available from: https://lib.dr.iastate.edu/etd/16243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xu Z. A dynamic taint forensic analysis tool for Android apps. [Thesis]. Iowa State University; 2017. Available from: https://lib.dr.iastate.edu/etd/16243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

21. Arthur, Kweku Kwakye. Considerations towards the development of a forensic evidence management system.

Degree: Computer Science, 2010, University of Pretoria

 The decentralized nature of the Internet forms its very foundation, yet it is this very nature that has opened networks and individual machines to a… (more)

Subjects/Keywords: Investigations; Finite state automata; Forensic evidence management system; Computer forensics; Digital forensics; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Arthur, K. K. (2010). Considerations towards the development of a forensic evidence management system. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/26567

Chicago Manual of Style (16th Edition):

Arthur, Kweku Kwakye. “Considerations towards the development of a forensic evidence management system.” 2010. Masters Thesis, University of Pretoria. Accessed February 23, 2020. http://hdl.handle.net/2263/26567.

MLA Handbook (7th Edition):

Arthur, Kweku Kwakye. “Considerations towards the development of a forensic evidence management system.” 2010. Web. 23 Feb 2020.

Vancouver:

Arthur KK. Considerations towards the development of a forensic evidence management system. [Internet] [Masters thesis]. University of Pretoria; 2010. [cited 2020 Feb 23]. Available from: http://hdl.handle.net/2263/26567.

Council of Science Editors:

Arthur KK. Considerations towards the development of a forensic evidence management system. [Masters Thesis]. University of Pretoria; 2010. Available from: http://hdl.handle.net/2263/26567


Purdue University

22. Nielsen, Jeremiah Jens. Distributed Digital Forensics on Pre-existing Internal Networks.

Degree: MS, Computer and Information Technology, 2013, Purdue University

  Today's large datasets are a major hindrance on digital investigations and have led to a substantial backlog of media that must be examined. While… (more)

Subjects/Keywords: client services; digital forensics; distributed digital forensics; forensic toolkit 4.1; mapreduce; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nielsen, J. J. (2013). Distributed Digital Forensics on Pre-existing Internal Networks. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/135

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nielsen, Jeremiah Jens. “Distributed Digital Forensics on Pre-existing Internal Networks.” 2013. Thesis, Purdue University. Accessed February 23, 2020. http://docs.lib.purdue.edu/open_access_theses/135.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nielsen, Jeremiah Jens. “Distributed Digital Forensics on Pre-existing Internal Networks.” 2013. Web. 23 Feb 2020.

Vancouver:

Nielsen JJ. Distributed Digital Forensics on Pre-existing Internal Networks. [Internet] [Thesis]. Purdue University; 2013. [cited 2020 Feb 23]. Available from: http://docs.lib.purdue.edu/open_access_theses/135.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nielsen JJ. Distributed Digital Forensics on Pre-existing Internal Networks. [Thesis]. Purdue University; 2013. Available from: http://docs.lib.purdue.edu/open_access_theses/135

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

23. [No author]. Considerations towards the development of a forensic evidence management system .

Degree: 2010, University of Pretoria

 The decentralized nature of the Internet forms its very foundation, yet it is this very nature that has opened networks and individual machines to a… (more)

Subjects/Keywords: Investigations; Finite state automata; Forensic evidence management system; Computer forensics; Digital forensics; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2010). Considerations towards the development of a forensic evidence management system . (Masters Thesis). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-07232010-192957/

Chicago Manual of Style (16th Edition):

author], [No. “Considerations towards the development of a forensic evidence management system .” 2010. Masters Thesis, University of Pretoria. Accessed February 23, 2020. http://upetd.up.ac.za/thesis/available/etd-07232010-192957/.

MLA Handbook (7th Edition):

author], [No. “Considerations towards the development of a forensic evidence management system .” 2010. Web. 23 Feb 2020.

Vancouver:

author] [. Considerations towards the development of a forensic evidence management system . [Internet] [Masters thesis]. University of Pretoria; 2010. [cited 2020 Feb 23]. Available from: http://upetd.up.ac.za/thesis/available/etd-07232010-192957/.

Council of Science Editors:

author] [. Considerations towards the development of a forensic evidence management system . [Masters Thesis]. University of Pretoria; 2010. Available from: http://upetd.up.ac.za/thesis/available/etd-07232010-192957/


AUT University

24. Spence, Michael Edward. Factors influencing Digital Evidence transfer across international borders: a case study .

Degree: 2011, AUT University

 Digital Forensics has grown out of the necessity to extract, analyse and present evidence from digital devices in support of an investigation or court case.… (more)

Subjects/Keywords: Digital Forensics; Transfer of Digital Evidence; Internaltional; Digital Evidence; Computer Forensics; International e-crime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spence, M. E. (2011). Factors influencing Digital Evidence transfer across international borders: a case study . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/1187

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Spence, Michael Edward. “Factors influencing Digital Evidence transfer across international borders: a case study .” 2011. Thesis, AUT University. Accessed February 23, 2020. http://hdl.handle.net/10292/1187.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Spence, Michael Edward. “Factors influencing Digital Evidence transfer across international borders: a case study .” 2011. Web. 23 Feb 2020.

Vancouver:

Spence ME. Factors influencing Digital Evidence transfer across international borders: a case study . [Internet] [Thesis]. AUT University; 2011. [cited 2020 Feb 23]. Available from: http://hdl.handle.net/10292/1187.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Spence ME. Factors influencing Digital Evidence transfer across international borders: a case study . [Thesis]. AUT University; 2011. Available from: http://hdl.handle.net/10292/1187

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

25. Saltaformaggio, Brendan D. Convicted by memory: Automatically recovering spatial-temporal evidence from memory images.

Degree: PhD, Computer Science, 2016, Purdue University

  Memory forensics can reveal “up to the minute” evidence of a device’s usage, often without requiring a suspect’s password to unlock the device, and… (more)

Subjects/Keywords: Applied sciences; Android; Cyber forensics; Memory forensics; Program analysis; Security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saltaformaggio, B. D. (2016). Convicted by memory: Automatically recovering spatial-temporal evidence from memory images. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/996

Chicago Manual of Style (16th Edition):

Saltaformaggio, Brendan D. “Convicted by memory: Automatically recovering spatial-temporal evidence from memory images.” 2016. Doctoral Dissertation, Purdue University. Accessed February 23, 2020. https://docs.lib.purdue.edu/open_access_dissertations/996.

MLA Handbook (7th Edition):

Saltaformaggio, Brendan D. “Convicted by memory: Automatically recovering spatial-temporal evidence from memory images.” 2016. Web. 23 Feb 2020.

Vancouver:

Saltaformaggio BD. Convicted by memory: Automatically recovering spatial-temporal evidence from memory images. [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2020 Feb 23]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/996.

Council of Science Editors:

Saltaformaggio BD. Convicted by memory: Automatically recovering spatial-temporal evidence from memory images. [Doctoral Dissertation]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_dissertations/996


University of South Africa

26. Themeli, Aluwani Rufaroh. Exploring the value of computer forensics in the investigation of procurement fraud.

Degree: 2017, University of South Africa

 The research problem for this study was that forensic investigators in the Forensic Services (FS) of the City of Tshwane (CoT) are unable to successfully… (more)

Subjects/Keywords: Forensic investigation; Computer forensics; Procurement fraud; Computer investigation; Red flags; Computer evidence; Network forensics; Kickbacks; Conflict of interest; Bid rigging

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Themeli, A. R. (2017). Exploring the value of computer forensics in the investigation of procurement fraud. (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/22400

Chicago Manual of Style (16th Edition):

Themeli, Aluwani Rufaroh. “Exploring the value of computer forensics in the investigation of procurement fraud.” 2017. Masters Thesis, University of South Africa. Accessed February 23, 2020. http://hdl.handle.net/10500/22400.

MLA Handbook (7th Edition):

Themeli, Aluwani Rufaroh. “Exploring the value of computer forensics in the investigation of procurement fraud.” 2017. Web. 23 Feb 2020.

Vancouver:

Themeli AR. Exploring the value of computer forensics in the investigation of procurement fraud. [Internet] [Masters thesis]. University of South Africa; 2017. [cited 2020 Feb 23]. Available from: http://hdl.handle.net/10500/22400.

Council of Science Editors:

Themeli AR. Exploring the value of computer forensics in the investigation of procurement fraud. [Masters Thesis]. University of South Africa; 2017. Available from: http://hdl.handle.net/10500/22400

27. Markanovic, Michel. Trusted memory acquisition using UEFI.

Degree: 2014, , Department of Creative Technologies

  Context. For computer forensic investigations, the necessity of unmodified data content is of vital essence. The solution presented in this paper is based on… (more)

Subjects/Keywords: UEFI; Secure Boot; trust; computer forensics; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Markanovic, M. (2014). Trusted memory acquisition using UEFI. (Thesis). , Department of Creative Technologies. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3582

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Markanovic, Michel. “Trusted memory acquisition using UEFI.” 2014. Thesis, , Department of Creative Technologies. Accessed February 23, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3582.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Markanovic, Michel. “Trusted memory acquisition using UEFI.” 2014. Web. 23 Feb 2020.

Vancouver:

Markanovic M. Trusted memory acquisition using UEFI. [Internet] [Thesis]. , Department of Creative Technologies; 2014. [cited 2020 Feb 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3582.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Markanovic M. Trusted memory acquisition using UEFI. [Thesis]. , Department of Creative Technologies; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3582

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

28. Crawford, Jesse Bryan. Knowing your bitcoin customer: A survey of bitcoin money laundering services and technical solutions for anti-money laundering compliance.

Degree: 2019, Iowa State University

 Cryptocurrencies are gaining significant attention and financial investment. Among the wave of new cryptocurrencies, the first cryptocurrency introduced, Bitcoin, remains the most notable and most… (more)

Subjects/Keywords: bitcoin; cryptocurrency; forensics; money laundering; Computer Engineering; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Crawford, J. B. (2019). Knowing your bitcoin customer: A survey of bitcoin money laundering services and technical solutions for anti-money laundering compliance. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/17661

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Crawford, Jesse Bryan. “Knowing your bitcoin customer: A survey of bitcoin money laundering services and technical solutions for anti-money laundering compliance.” 2019. Thesis, Iowa State University. Accessed February 23, 2020. https://lib.dr.iastate.edu/etd/17661.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Crawford, Jesse Bryan. “Knowing your bitcoin customer: A survey of bitcoin money laundering services and technical solutions for anti-money laundering compliance.” 2019. Web. 23 Feb 2020.

Vancouver:

Crawford JB. Knowing your bitcoin customer: A survey of bitcoin money laundering services and technical solutions for anti-money laundering compliance. [Internet] [Thesis]. Iowa State University; 2019. [cited 2020 Feb 23]. Available from: https://lib.dr.iastate.edu/etd/17661.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Crawford JB. Knowing your bitcoin customer: A survey of bitcoin money laundering services and technical solutions for anti-money laundering compliance. [Thesis]. Iowa State University; 2019. Available from: https://lib.dr.iastate.edu/etd/17661

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Barone, Joshua M. Automated Timeline Anomaly Detection.

Degree: MS, Computer Science, 2013, University of New Orleans

  Digital forensics is the practice of trained investigators gathering and analyzing evidence from digital devices such as computers and smart phones. On these digital… (more)

Subjects/Keywords: Timeline; Anomaly; Forensics; Digital Forensics; Computer Forensics; Other Computer Sciences

…There are usually four stages to digital forensics investigation: ● Gathering of evidence… …computer name - This section is a UTF-16 string, that is NULL terminated (‘\x00\… …x00’), containing the computer name that generated the log entry. ○ general buffer… …occurred. And they combine to present a picture of the events occurring on a computer system… …purposefully manipulating the time on a computer system, these out of order entry sequences will… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barone, J. M. (2013). Automated Timeline Anomaly Detection. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1609

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barone, Joshua M. “Automated Timeline Anomaly Detection.” 2013. Thesis, University of New Orleans. Accessed February 23, 2020. https://scholarworks.uno.edu/td/1609.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barone, Joshua M. “Automated Timeline Anomaly Detection.” 2013. Web. 23 Feb 2020.

Vancouver:

Barone JM. Automated Timeline Anomaly Detection. [Internet] [Thesis]. University of New Orleans; 2013. [cited 2020 Feb 23]. Available from: https://scholarworks.uno.edu/td/1609.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barone JM. Automated Timeline Anomaly Detection. [Thesis]. University of New Orleans; 2013. Available from: https://scholarworks.uno.edu/td/1609

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

30. Delgado, Manuel. Combater o crime económico com armas digitais: o papel do open-source.

Degree: 2012, RCAAP

A par do extraordinário desenvolvimento económico proporcionado pela evolução das Tecnologias da Informação e Comunicação, potenciado, nos anos mais recentes, com o desenvolvimento da internet,… (more)

Subjects/Keywords: Informática forense; Forense digital; Evidência digital; Investigação de crime económico; Computer forensics; Digital forensics; Digital evidence; Economic crime investigation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Delgado, M. (2012). Combater o crime económico com armas digitais: o papel do open-source. (Thesis). RCAAP. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:repositorio.iscte-iul.pt:10071/8063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Delgado, Manuel. “Combater o crime económico com armas digitais: o papel do open-source.” 2012. Thesis, RCAAP. Accessed February 23, 2020. https://www.rcaap.pt/detail.jsp?id=oai:repositorio.iscte-iul.pt:10071/8063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Delgado, Manuel. “Combater o crime económico com armas digitais: o papel do open-source.” 2012. Web. 23 Feb 2020.

Vancouver:

Delgado M. Combater o crime económico com armas digitais: o papel do open-source. [Internet] [Thesis]. RCAAP; 2012. [cited 2020 Feb 23]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.iscte-iul.pt:10071/8063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Delgado M. Combater o crime económico com armas digitais: o papel do open-source. [Thesis]. RCAAP; 2012. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.iscte-iul.pt:10071/8063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5]

.