Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Digital Investigation). Showing records 1 – 30 of 37 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


AUT University

1. Scholtz, Johan. Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes .

Degree: 2010, AUT University

Digital Data Forensics is constantly under scrutiny to standardize processes. Previous researchers moved between various frameworks without presenting a firm platform or solution, addressing standardization.… (more)

Subjects/Keywords: Digital forensics; Automated digital forensics; Standardised digital forensics investigation; Predictive digital forensic investigation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Scholtz, J. (2010). Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/1098

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Scholtz, Johan. “Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes .” 2010. Thesis, AUT University. Accessed April 05, 2020. http://hdl.handle.net/10292/1098.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Scholtz, Johan. “Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes .” 2010. Web. 05 Apr 2020.

Vancouver:

Scholtz J. Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes . [Internet] [Thesis]. AUT University; 2010. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10292/1098.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Scholtz J. Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes . [Thesis]. AUT University; 2010. Available from: http://hdl.handle.net/10292/1098

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oxford

2. Carvalho, Rodrigo Alves. Enhancing the investigation of malware-related crimes using semantic technologies.

Degree: PhD, 2018, University of Oxford

 The expansion of technology connectivity and the pervasiveness of data in our society pose both challenges and opportunities for the government and the private sector.… (more)

Subjects/Keywords: Cybercrime investigation; Digital forensic science; Semantic technologies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carvalho, R. A. (2018). Enhancing the investigation of malware-related crimes using semantic technologies. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:5abeb135-ff33-42b4-8847-0aefe8e82c8f ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791644

Chicago Manual of Style (16th Edition):

Carvalho, Rodrigo Alves. “Enhancing the investigation of malware-related crimes using semantic technologies.” 2018. Doctoral Dissertation, University of Oxford. Accessed April 05, 2020. http://ora.ox.ac.uk/objects/uuid:5abeb135-ff33-42b4-8847-0aefe8e82c8f ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791644.

MLA Handbook (7th Edition):

Carvalho, Rodrigo Alves. “Enhancing the investigation of malware-related crimes using semantic technologies.” 2018. Web. 05 Apr 2020.

Vancouver:

Carvalho RA. Enhancing the investigation of malware-related crimes using semantic technologies. [Internet] [Doctoral dissertation]. University of Oxford; 2018. [cited 2020 Apr 05]. Available from: http://ora.ox.ac.uk/objects/uuid:5abeb135-ff33-42b4-8847-0aefe8e82c8f ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791644.

Council of Science Editors:

Carvalho RA. Enhancing the investigation of malware-related crimes using semantic technologies. [Doctoral Dissertation]. University of Oxford; 2018. Available from: http://ora.ox.ac.uk/objects/uuid:5abeb135-ff33-42b4-8847-0aefe8e82c8f ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791644

3. Delgado, Manuel. Combater o crime económico com armas digitais: o papel do open-source.

Degree: 2012, RCAAP

A par do extraordinário desenvolvimento económico proporcionado pela evolução das Tecnologias da Informação e Comunicação, potenciado, nos anos mais recentes, com o desenvolvimento da internet,… (more)

Subjects/Keywords: Informática forense; Forense digital; Evidência digital; Investigação de crime económico; Computer forensics; Digital forensics; Digital evidence; Economic crime investigation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Delgado, M. (2012). Combater o crime económico com armas digitais: o papel do open-source. (Thesis). RCAAP. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:repositorio.iscte-iul.pt:10071/8063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Delgado, Manuel. “Combater o crime económico com armas digitais: o papel do open-source.” 2012. Thesis, RCAAP. Accessed April 05, 2020. https://www.rcaap.pt/detail.jsp?id=oai:repositorio.iscte-iul.pt:10071/8063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Delgado, Manuel. “Combater o crime económico com armas digitais: o papel do open-source.” 2012. Web. 05 Apr 2020.

Vancouver:

Delgado M. Combater o crime económico com armas digitais: o papel do open-source. [Internet] [Thesis]. RCAAP; 2012. [cited 2020 Apr 05]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.iscte-iul.pt:10071/8063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Delgado M. Combater o crime económico com armas digitais: o papel do open-source. [Thesis]. RCAAP; 2012. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.iscte-iul.pt:10071/8063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

4. Adedayo, Oluwasola Mary. Reconstruction in Database Forensics.

Degree: PhD, Computer Science, 2015, University of Pretoria

 The increasing usage of databases in the storage of critical and sensitive information in many organizations has led to an increase in the rate at… (more)

Subjects/Keywords: Computer Science; Digital Forensics; Database Forensics; Digital Forensics Investigation; Forensic analysis; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adedayo, O. M. (2015). Reconstruction in Database Forensics. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/43777

Chicago Manual of Style (16th Edition):

Adedayo, Oluwasola Mary. “Reconstruction in Database Forensics.” 2015. Doctoral Dissertation, University of Pretoria. Accessed April 05, 2020. http://hdl.handle.net/2263/43777.

MLA Handbook (7th Edition):

Adedayo, Oluwasola Mary. “Reconstruction in Database Forensics.” 2015. Web. 05 Apr 2020.

Vancouver:

Adedayo OM. Reconstruction in Database Forensics. [Internet] [Doctoral dissertation]. University of Pretoria; 2015. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/2263/43777.

Council of Science Editors:

Adedayo OM. Reconstruction in Database Forensics. [Doctoral Dissertation]. University of Pretoria; 2015. Available from: http://hdl.handle.net/2263/43777


University of Otago

5. Dowling, Anthony. Digital forensics: A demonstration of the effectiveness of the sleuth kit and autopsy forensic browser .

Degree: 2011, University of Otago

 The Sleuth Kit is a collection of Linux tools that perform different aspects of a file system analysis. The Autopsy Forensic Browser is a graphical… (more)

Subjects/Keywords: Sleuth Kit; Linux; Autopsy Forensic Browser; investigation; digital forensic tools

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dowling, A. (2011). Digital forensics: A demonstration of the effectiveness of the sleuth kit and autopsy forensic browser . (Masters Thesis). University of Otago. Retrieved from http://hdl.handle.net/10523/1338

Chicago Manual of Style (16th Edition):

Dowling, Anthony. “Digital forensics: A demonstration of the effectiveness of the sleuth kit and autopsy forensic browser .” 2011. Masters Thesis, University of Otago. Accessed April 05, 2020. http://hdl.handle.net/10523/1338.

MLA Handbook (7th Edition):

Dowling, Anthony. “Digital forensics: A demonstration of the effectiveness of the sleuth kit and autopsy forensic browser .” 2011. Web. 05 Apr 2020.

Vancouver:

Dowling A. Digital forensics: A demonstration of the effectiveness of the sleuth kit and autopsy forensic browser . [Internet] [Masters thesis]. University of Otago; 2011. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10523/1338.

Council of Science Editors:

Dowling A. Digital forensics: A demonstration of the effectiveness of the sleuth kit and autopsy forensic browser . [Masters Thesis]. University of Otago; 2011. Available from: http://hdl.handle.net/10523/1338

6. Nikooazm, Elina. Validation des logiciels d'expertise judiciaire de preuves informatiques : Validation of digital forensic software.

Degree: Docteur es, Informatique, 2015, Paris 2

Dans les affaires judiciaires, les juges confrontés à des questions d’ordre techniques en matière informatique, recourent à des experts qui mettent leur savoir-faire au service… (more)

Subjects/Keywords: Expertise judiciare en informatique; Investigation technique; Preuves numériques; Validation; Outils d'analyse de preuves; Digital forensic; Technical investigation; Digital evidence; Validation; Digital forensic tools

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nikooazm, E. (2015). Validation des logiciels d'expertise judiciaire de preuves informatiques : Validation of digital forensic software. (Doctoral Dissertation). Paris 2. Retrieved from http://www.theses.fr/2015PA020021

Chicago Manual of Style (16th Edition):

Nikooazm, Elina. “Validation des logiciels d'expertise judiciaire de preuves informatiques : Validation of digital forensic software.” 2015. Doctoral Dissertation, Paris 2. Accessed April 05, 2020. http://www.theses.fr/2015PA020021.

MLA Handbook (7th Edition):

Nikooazm, Elina. “Validation des logiciels d'expertise judiciaire de preuves informatiques : Validation of digital forensic software.” 2015. Web. 05 Apr 2020.

Vancouver:

Nikooazm E. Validation des logiciels d'expertise judiciaire de preuves informatiques : Validation of digital forensic software. [Internet] [Doctoral dissertation]. Paris 2; 2015. [cited 2020 Apr 05]. Available from: http://www.theses.fr/2015PA020021.

Council of Science Editors:

Nikooazm E. Validation des logiciels d'expertise judiciaire de preuves informatiques : Validation of digital forensic software. [Doctoral Dissertation]. Paris 2; 2015. Available from: http://www.theses.fr/2015PA020021

7. Romanello, Laís Aparecida [UNESP]. Potencialidades do uso do celular na sala de aula: atividades investigativas para o conceito de função.

Degree: 2017, Universidade Estadual Paulista

Esta pesquisa tem como objetivo investigar o uso do aplicativo Matemática para celulares inteligentes no desenvolvimento de conceitos de função em sala de aula. Em… (more)

Subjects/Keywords: Smartphone; Construcionismo; Investigação; Tecnologias digitais; Ensino fundamental; Constructionism; Investigation; Digital technologies; Elementary education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Romanello, L. A. [. (2017). Potencialidades do uso do celular na sala de aula: atividades investigativas para o conceito de função. (Thesis). Universidade Estadual Paulista. Retrieved from http://hdl.handle.net/11449/148613

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Romanello, Laís Aparecida [UNESP]. “Potencialidades do uso do celular na sala de aula: atividades investigativas para o conceito de função.” 2017. Thesis, Universidade Estadual Paulista. Accessed April 05, 2020. http://hdl.handle.net/11449/148613.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Romanello, Laís Aparecida [UNESP]. “Potencialidades do uso do celular na sala de aula: atividades investigativas para o conceito de função.” 2017. Web. 05 Apr 2020.

Vancouver:

Romanello LA[. Potencialidades do uso do celular na sala de aula: atividades investigativas para o conceito de função. [Internet] [Thesis]. Universidade Estadual Paulista; 2017. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/11449/148613.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Romanello LA[. Potencialidades do uso do celular na sala de aula: atividades investigativas para o conceito de função. [Thesis]. Universidade Estadual Paulista; 2017. Available from: http://hdl.handle.net/11449/148613

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Alqahtany, Saad. A forensically-enabled IaaS cloud computing architecture.

Degree: PhD, 2017, University of Plymouth

 Cloud computing has been advancing at an intense pace. It has become one of the most important research topics in computer science and information systems.… (more)

Subjects/Keywords: 004.67; Digital Forensics; Cloud Forensics; Digital Investigation

…the new challenges that cloud computing brings to digital investigation processes and seek… …136 7.3.4 Thoughts on the Cloud FAAS capabilities in terms of undertaking an investigation… …138 7.3.5 Application to digital investigations… …15 Figure 3-1 Main Stages of Digital Forensic Process… …frequently been an “after-thought” in Cloud Computing, digital forensics has been an “after-after… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alqahtany, S. (2017). A forensically-enabled IaaS cloud computing architecture. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/9508

Chicago Manual of Style (16th Edition):

Alqahtany, Saad. “A forensically-enabled IaaS cloud computing architecture.” 2017. Doctoral Dissertation, University of Plymouth. Accessed April 05, 2020. http://hdl.handle.net/10026.1/9508.

MLA Handbook (7th Edition):

Alqahtany, Saad. “A forensically-enabled IaaS cloud computing architecture.” 2017. Web. 05 Apr 2020.

Vancouver:

Alqahtany S. A forensically-enabled IaaS cloud computing architecture. [Internet] [Doctoral dissertation]. University of Plymouth; 2017. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10026.1/9508.

Council of Science Editors:

Alqahtany S. A forensically-enabled IaaS cloud computing architecture. [Doctoral Dissertation]. University of Plymouth; 2017. Available from: http://hdl.handle.net/10026.1/9508


AUT University

9. Lutui, Paula Raymond. Digital forensic process model for mobile business devices: smart technologies .

Degree: AUT University

 Worldwide usage of mobile SMART devices has been dramatically increased over the past decade. The popularity of these devices has also grown as a result… (more)

Subjects/Keywords: Digital forensic; Network forensics; Forensic investigation; Cloud foreniscs; Investigation process models; Investigation framework; Mobile forensics; Investigation guidelines

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lutui, P. R. (n.d.). Digital forensic process model for mobile business devices: smart technologies . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/9242

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lutui, Paula Raymond. “Digital forensic process model for mobile business devices: smart technologies .” Thesis, AUT University. Accessed April 05, 2020. http://hdl.handle.net/10292/9242.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lutui, Paula Raymond. “Digital forensic process model for mobile business devices: smart technologies .” Web. 05 Apr 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Lutui PR. Digital forensic process model for mobile business devices: smart technologies . [Internet] [Thesis]. AUT University; [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10292/9242.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Lutui PR. Digital forensic process model for mobile business devices: smart technologies . [Thesis]. AUT University; Available from: http://hdl.handle.net/10292/9242

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of North Texas

10. Erdonmez, Erhan. Investigation of Computer Crimes.

Degree: 2002, University of North Texas

 In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the… (more)

Subjects/Keywords: Computer crimes  – Investigation.; Computer crime; Investigation; Digital evidence; Computer fraud; Cyber crime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Erdonmez, E. (2002). Investigation of Computer Crimes. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc3185/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Erdonmez, Erhan. “Investigation of Computer Crimes.” 2002. Thesis, University of North Texas. Accessed April 05, 2020. https://digital.library.unt.edu/ark:/67531/metadc3185/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Erdonmez, Erhan. “Investigation of Computer Crimes.” 2002. Web. 05 Apr 2020.

Vancouver:

Erdonmez E. Investigation of Computer Crimes. [Internet] [Thesis]. University of North Texas; 2002. [cited 2020 Apr 05]. Available from: https://digital.library.unt.edu/ark:/67531/metadc3185/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Erdonmez E. Investigation of Computer Crimes. [Thesis]. University of North Texas; 2002. Available from: https://digital.library.unt.edu/ark:/67531/metadc3185/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ballarat

11. Dell, Geoff. Aircraft pushback accidents worldwide 1964-1992 : causes and prevention.

Degree: 1993, University of Ballarat

The purpose of the study was to analyse aircraft pushback accidents which have resulted in death or serious injury to aircraft pusback ground crew members and to develop effective strategies to prevent such accidents.

Thesis (Master of Applied Science)

Subjects/Keywords: Industrial safety  – Australia; Aircraft accidents  – Investigation; Australian Digital Thesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dell, G. (1993). Aircraft pushback accidents worldwide 1964-1992 : causes and prevention. (Thesis). University of Ballarat. Retrieved from http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/43933

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dell, Geoff. “Aircraft pushback accidents worldwide 1964-1992 : causes and prevention.” 1993. Thesis, University of Ballarat. Accessed April 05, 2020. http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/43933.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dell, Geoff. “Aircraft pushback accidents worldwide 1964-1992 : causes and prevention.” 1993. Web. 05 Apr 2020.

Vancouver:

Dell G. Aircraft pushback accidents worldwide 1964-1992 : causes and prevention. [Internet] [Thesis]. University of Ballarat; 1993. [cited 2020 Apr 05]. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/43933.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dell G. Aircraft pushback accidents worldwide 1964-1992 : causes and prevention. [Thesis]. University of Ballarat; 1993. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/43933

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Dell, Geoff. Aircraft pushback accidents worldwide 1964-1992 : causes and prevention.

Degree: 1993, Federation University Australia

The purpose of the study was to analyse aircraft pushback accidents which have resulted in death or serious injury to aircraft pusback ground crew members and to develop effective strategies to prevent such accidents.

Thesis (Master of Applied Science)

Subjects/Keywords: Industrial safety  – Australia; Aircraft accidents  – Investigation; Australian Digital Thesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dell, G. (1993). Aircraft pushback accidents worldwide 1964-1992 : causes and prevention. (Thesis). Federation University Australia. Retrieved from http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/39809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dell, Geoff. “Aircraft pushback accidents worldwide 1964-1992 : causes and prevention.” 1993. Thesis, Federation University Australia. Accessed April 05, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/39809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dell, Geoff. “Aircraft pushback accidents worldwide 1964-1992 : causes and prevention.” 1993. Web. 05 Apr 2020.

Vancouver:

Dell G. Aircraft pushback accidents worldwide 1964-1992 : causes and prevention. [Internet] [Thesis]. Federation University Australia; 1993. [cited 2020 Apr 05]. Available from: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/39809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dell G. Aircraft pushback accidents worldwide 1964-1992 : causes and prevention. [Thesis]. Federation University Australia; 1993. Available from: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/39809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Scanlon, Mark. Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies.

Degree: 2019, University College Dublin. School of Computer Science & Informatics  

 The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet protocols and networks lend themselves well to being exploited by criminals to execute a large range… (more)

Subjects/Keywords: Botnets; Cybercrime Investigation; Digital Forensics; Peer-to-Peer Networks; 0|aComputer crimes.; #0|aPeer-to-peer architecture (Computer networks).

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Scanlon, M. (2019). Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies. (Thesis). University College Dublin. School of Computer Science & Informatics  . Retrieved from http://hdl.handle.net/10197/10610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Scanlon, Mark. “Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies.” 2019. Thesis, University College Dublin. School of Computer Science & Informatics  . Accessed April 05, 2020. http://hdl.handle.net/10197/10610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Scanlon, Mark. “Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies.” 2019. Web. 05 Apr 2020.

Vancouver:

Scanlon M. Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies. [Internet] [Thesis]. University College Dublin. School of Computer Science & Informatics  ; 2019. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10197/10610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Scanlon M. Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies. [Thesis]. University College Dublin. School of Computer Science & Informatics  ; 2019. Available from: http://hdl.handle.net/10197/10610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

14. Fei, B.K.L. (Bennie Kar Leung). Data visualisation in digital forensics.

Degree: Computer Science, 2007, University of Pretoria

 As digital crimes have risen, so has the need for digital forensics. Numerous state-of-the-art tools have been developed to assist digital investigators conduct proper investigations… (more)

Subjects/Keywords: Visualisation; Analysis; Digital forensics; Digital investigation; Self-organising map; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fei, B. K. L. (. K. (2007). Data visualisation in digital forensics. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/22996

Chicago Manual of Style (16th Edition):

Fei, B K L (Bennie Kar. “Data visualisation in digital forensics.” 2007. Masters Thesis, University of Pretoria. Accessed April 05, 2020. http://hdl.handle.net/2263/22996.

MLA Handbook (7th Edition):

Fei, B K L (Bennie Kar. “Data visualisation in digital forensics.” 2007. Web. 05 Apr 2020.

Vancouver:

Fei BKL(K. Data visualisation in digital forensics. [Internet] [Masters thesis]. University of Pretoria; 2007. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/2263/22996.

Council of Science Editors:

Fei BKL(K. Data visualisation in digital forensics. [Masters Thesis]. University of Pretoria; 2007. Available from: http://hdl.handle.net/2263/22996


University of Pretoria

15. [No author]. Data visualisation in digital forensics .

Degree: 2007, University of Pretoria

 As digital crimes have risen, so has the need for digital forensics. Numerous state-of-the-art tools have been developed to assist digital investigators conduct proper investigations… (more)

Subjects/Keywords: Visualisation; Analysis; Digital forensics; Digital investigation; Self-organising map; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2007). Data visualisation in digital forensics . (Masters Thesis). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-03072007-153241/

Chicago Manual of Style (16th Edition):

author], [No. “Data visualisation in digital forensics .” 2007. Masters Thesis, University of Pretoria. Accessed April 05, 2020. http://upetd.up.ac.za/thesis/available/etd-03072007-153241/.

MLA Handbook (7th Edition):

author], [No. “Data visualisation in digital forensics .” 2007. Web. 05 Apr 2020.

Vancouver:

author] [. Data visualisation in digital forensics . [Internet] [Masters thesis]. University of Pretoria; 2007. [cited 2020 Apr 05]. Available from: http://upetd.up.ac.za/thesis/available/etd-03072007-153241/.

Council of Science Editors:

author] [. Data visualisation in digital forensics . [Masters Thesis]. University of Pretoria; 2007. Available from: http://upetd.up.ac.za/thesis/available/etd-03072007-153241/


KTH

16. Homem, Irvin. LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I.

Degree: Information and Communication Technology (ICT), 2013, KTH

  The Internet in its most basic form is a complex information sharing organism. There are billions of interconnected elements with varying capabilities that work… (more)

Subjects/Keywords: Digital Investigation; Incident Response; Digital Evidence; Automated Evidence Seizure; Collaborative Forensics; Live Forensics; Big Data; P2P Networks; Cloud Storage; Hypervisors; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Homem, I. (2013). LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Homem, Irvin. “LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I.” 2013. Thesis, KTH. Accessed April 05, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Homem, Irvin. “LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I.” 2013. Web. 05 Apr 2020.

Vancouver:

Homem I. LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I. [Internet] [Thesis]. KTH; 2013. [cited 2020 Apr 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Homem I. LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I. [Thesis]. KTH; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Halmstad University

17. Celik, Ali. Digital mobbning - en explorativ fallstudie med särskilt fokus på utredning.

Degree: Computer and Electrical Engineering (IDE), 2011, Halmstad University

Stiftelsen för Internetinfrastruktur har rapporterat att användningen av Internet är utbredd och placerar Sverige bland dem främsta av världens länder. År 2010 hade 84… (more)

Subjects/Keywords: Digital bullying; e-bullying; abusive treatment; criminal investigation; Digital mobbning; e-mobbning; kränkandebehandling; brottsutredning; Law; Juridik; Computer and Information Sciences; Data- och informationsvetenskap; Social Sciences; Samhällsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Celik, A. (2011). Digital mobbning - en explorativ fallstudie med särskilt fokus på utredning. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-15755

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Celik, Ali. “Digital mobbning - en explorativ fallstudie med särskilt fokus på utredning.” 2011. Thesis, Halmstad University. Accessed April 05, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-15755.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Celik, Ali. “Digital mobbning - en explorativ fallstudie med särskilt fokus på utredning.” 2011. Web. 05 Apr 2020.

Vancouver:

Celik A. Digital mobbning - en explorativ fallstudie med särskilt fokus på utredning. [Internet] [Thesis]. Halmstad University; 2011. [cited 2020 Apr 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-15755.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Celik A. Digital mobbning - en explorativ fallstudie med särskilt fokus på utredning. [Thesis]. Halmstad University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-15755

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Montasari, Reza. The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice.

Degree: PhD, 2016, University of Derby

Subjects/Keywords: Digital Forensics; Process Model; Computer Forensics; Digital Investigation; Comprehensive Model; Forensic Investigation; Generic Model; Formal Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Montasari, R. (2016). The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice. (Doctoral Dissertation). University of Derby. Retrieved from http://hdl.handle.net/10545/620799

Chicago Manual of Style (16th Edition):

Montasari, Reza. “The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice.” 2016. Doctoral Dissertation, University of Derby. Accessed April 05, 2020. http://hdl.handle.net/10545/620799.

MLA Handbook (7th Edition):

Montasari, Reza. “The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice.” 2016. Web. 05 Apr 2020.

Vancouver:

Montasari R. The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice. [Internet] [Doctoral dissertation]. University of Derby; 2016. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10545/620799.

Council of Science Editors:

Montasari R. The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice. [Doctoral Dissertation]. University of Derby; 2016. Available from: http://hdl.handle.net/10545/620799


Cranfield University

19. Hargreaves, Christopher James. Assessing the reliability of digital evidence from live investigations involving encryption.

Degree: Thesis (D.B.A.), 2009, Cranfield University

 The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine… (more)

Subjects/Keywords: 004; Forensic engineering - Data processing; Forensic Computing; Microcomputers; Data encryption - Computer science; Computer security; Criminal investigation; Electronic records - Law and legislation; Digital signatures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hargreaves, C. J. (2009). Assessing the reliability of digital evidence from live investigations involving encryption. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/4007 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.512751

Chicago Manual of Style (16th Edition):

Hargreaves, Christopher James. “Assessing the reliability of digital evidence from live investigations involving encryption.” 2009. Doctoral Dissertation, Cranfield University. Accessed April 05, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/4007 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.512751.

MLA Handbook (7th Edition):

Hargreaves, Christopher James. “Assessing the reliability of digital evidence from live investigations involving encryption.” 2009. Web. 05 Apr 2020.

Vancouver:

Hargreaves CJ. Assessing the reliability of digital evidence from live investigations involving encryption. [Internet] [Doctoral dissertation]. Cranfield University; 2009. [cited 2020 Apr 05]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/4007 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.512751.

Council of Science Editors:

Hargreaves CJ. Assessing the reliability of digital evidence from live investigations involving encryption. [Doctoral Dissertation]. Cranfield University; 2009. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/4007 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.512751


University of South Africa

20. Pooe, El Antonio. Developing a multidisciplinary digital forensic readiness model for evidentiary data handling .

Degree: 2018, University of South Africa

 There is a growing global recognition as to the importance of outlawing malicious computer related acts in a timely manner, yet few organisations have the… (more)

Subjects/Keywords: Digital forensics; Forensic readiness; Computer forensics; Planning; Investigation; Risk management; Evidence; Cybercrime; Multidisciplinary approach; Triangulation; Grounded theory; Systematic literature review; Qualitative research

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pooe, E. A. (2018). Developing a multidisciplinary digital forensic readiness model for evidentiary data handling . (Doctoral Dissertation). University of South Africa. Retrieved from http://hdl.handle.net/10500/25316

Chicago Manual of Style (16th Edition):

Pooe, El Antonio. “Developing a multidisciplinary digital forensic readiness model for evidentiary data handling .” 2018. Doctoral Dissertation, University of South Africa. Accessed April 05, 2020. http://hdl.handle.net/10500/25316.

MLA Handbook (7th Edition):

Pooe, El Antonio. “Developing a multidisciplinary digital forensic readiness model for evidentiary data handling .” 2018. Web. 05 Apr 2020.

Vancouver:

Pooe EA. Developing a multidisciplinary digital forensic readiness model for evidentiary data handling . [Internet] [Doctoral dissertation]. University of South Africa; 2018. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10500/25316.

Council of Science Editors:

Pooe EA. Developing a multidisciplinary digital forensic readiness model for evidentiary data handling . [Doctoral Dissertation]. University of South Africa; 2018. Available from: http://hdl.handle.net/10500/25316


AUT University

21. Alshaifi, Saud. Assessing the availability of forensic evidence from social networking sites: tool capability .

Degree: AUT University

 The evolution and popularity of Online Social Networking Sites (OSNSs) has produced a new platform for communications and collaborations. Features provided by OSNSs allow users… (more)

Subjects/Keywords: Digital forensics; Social network forensics; Tool evaluation; Online Social Networking Sites; Browser forensics; Investigation guideline; Forensic investigation; Digital forensic tools; Network forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alshaifi, S. (n.d.). Assessing the availability of forensic evidence from social networking sites: tool capability . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/9769

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alshaifi, Saud. “Assessing the availability of forensic evidence from social networking sites: tool capability .” Thesis, AUT University. Accessed April 05, 2020. http://hdl.handle.net/10292/9769.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alshaifi, Saud. “Assessing the availability of forensic evidence from social networking sites: tool capability .” Web. 05 Apr 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Alshaifi S. Assessing the availability of forensic evidence from social networking sites: tool capability . [Internet] [Thesis]. AUT University; [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10292/9769.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Alshaifi S. Assessing the availability of forensic evidence from social networking sites: tool capability . [Thesis]. AUT University; Available from: http://hdl.handle.net/10292/9769

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of New Orleans

22. Marziale, Lodovico. Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations.

Degree: PhD, Computer Science, 2009, University of New Orleans

Digital forensics is the science concerned with discovering, preserving, and analyzing evidence on digital devices. The intent is to be able to determine what events… (more)

Subjects/Keywords: Computer Forensics; Digital Forensics; Digital Investigation; File Carving; Live Forensics; RAM Forensics; Forensic Discovery; Forensic Discovery Auditing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marziale, L. (2009). Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations. (Doctoral Dissertation). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1027

Chicago Manual of Style (16th Edition):

Marziale, Lodovico. “Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations.” 2009. Doctoral Dissertation, University of New Orleans. Accessed April 05, 2020. https://scholarworks.uno.edu/td/1027.

MLA Handbook (7th Edition):

Marziale, Lodovico. “Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations.” 2009. Web. 05 Apr 2020.

Vancouver:

Marziale L. Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations. [Internet] [Doctoral dissertation]. University of New Orleans; 2009. [cited 2020 Apr 05]. Available from: https://scholarworks.uno.edu/td/1027.

Council of Science Editors:

Marziale L. Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations. [Doctoral Dissertation]. University of New Orleans; 2009. Available from: https://scholarworks.uno.edu/td/1027


University of Central Florida

23. Gerber, Matthew. Formalization Of Input And Output In Modern Operating Systems: The Hadley Model.

Degree: 2005, University of Central Florida

 We present the Hadley model, a formal descriptive model of input and output for modern computer operating systems. Our model is intentionally inspired by the… (more)

Subjects/Keywords: hadley system; operating systems; software verification; software reliability; device drivers; digital investigation; Computer Sciences; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gerber, M. (2005). Formalization Of Input And Output In Modern Operating Systems: The Hadley Model. (Doctoral Dissertation). University of Central Florida. Retrieved from https://stars.library.ucf.edu/etd/324

Chicago Manual of Style (16th Edition):

Gerber, Matthew. “Formalization Of Input And Output In Modern Operating Systems: The Hadley Model.” 2005. Doctoral Dissertation, University of Central Florida. Accessed April 05, 2020. https://stars.library.ucf.edu/etd/324.

MLA Handbook (7th Edition):

Gerber, Matthew. “Formalization Of Input And Output In Modern Operating Systems: The Hadley Model.” 2005. Web. 05 Apr 2020.

Vancouver:

Gerber M. Formalization Of Input And Output In Modern Operating Systems: The Hadley Model. [Internet] [Doctoral dissertation]. University of Central Florida; 2005. [cited 2020 Apr 05]. Available from: https://stars.library.ucf.edu/etd/324.

Council of Science Editors:

Gerber M. Formalization Of Input And Output In Modern Operating Systems: The Hadley Model. [Doctoral Dissertation]. University of Central Florida; 2005. Available from: https://stars.library.ucf.edu/etd/324

24. Lalanne, Vincent. Gestion des risques appliquée aux systèmes d’information distribués : Risk management to distributed information systems.

Degree: Docteur es, Informatique, 2013, Pau

Dans cette thèse nous abordons la gestion des risques appliquée aux systèmes d’information distribués. Nous traitons des problèmes d’interopérabilité et de sécurisation des échanges dans… (more)

Subjects/Keywords: ISO/IEC 27005:2011; Web Services; WS security; SOA; Cloud; Métadonnées; Données personnelles; Sécurité de l’information; Entreprise innovante; Investigation numérique; ISO / IEC 27005:2011; Web Services; WS security; SOA; Cloud; Metadata; Personal data; Information security; Innovative company; Digital forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lalanne, V. (2013). Gestion des risques appliquée aux systèmes d’information distribués : Risk management to distributed information systems. (Doctoral Dissertation). Pau. Retrieved from http://www.theses.fr/2013PAUU3052

Chicago Manual of Style (16th Edition):

Lalanne, Vincent. “Gestion des risques appliquée aux systèmes d’information distribués : Risk management to distributed information systems.” 2013. Doctoral Dissertation, Pau. Accessed April 05, 2020. http://www.theses.fr/2013PAUU3052.

MLA Handbook (7th Edition):

Lalanne, Vincent. “Gestion des risques appliquée aux systèmes d’information distribués : Risk management to distributed information systems.” 2013. Web. 05 Apr 2020.

Vancouver:

Lalanne V. Gestion des risques appliquée aux systèmes d’information distribués : Risk management to distributed information systems. [Internet] [Doctoral dissertation]. Pau; 2013. [cited 2020 Apr 05]. Available from: http://www.theses.fr/2013PAUU3052.

Council of Science Editors:

Lalanne V. Gestion des risques appliquée aux systèmes d’information distribués : Risk management to distributed information systems. [Doctoral Dissertation]. Pau; 2013. Available from: http://www.theses.fr/2013PAUU3052


Brno University of Technology

25. Beneš, Martin. Forenzní analýza v operačních systémech Linux .

Degree: 2012, Brno University of Technology

 Práce se zabývá rozborem možností forenzní analýzy při vyšetřování na operačních systémech Linux. Použitím distribuce BackTrack a obsažených nástrojů je provedeno forenzní vyšetřování na testovací… (more)

Subjects/Keywords: forenzní analýza; operační systém Linux; distribuce BackTrack; počítačový zločin; digitální důkaz; forenzní vyšetřování; i-uzel; forenzní vyšetřovací prostředí; Forensic analysis; Linux operating system; BackTrack distribution; computer crime; digital evidence; forensic investigation; i-node; forensic framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beneš, M. (2012). Forenzní analýza v operačních systémech Linux . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/55200

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Beneš, Martin. “Forenzní analýza v operačních systémech Linux .” 2012. Thesis, Brno University of Technology. Accessed April 05, 2020. http://hdl.handle.net/11012/55200.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Beneš, Martin. “Forenzní analýza v operačních systémech Linux .” 2012. Web. 05 Apr 2020.

Vancouver:

Beneš M. Forenzní analýza v operačních systémech Linux . [Internet] [Thesis]. Brno University of Technology; 2012. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/11012/55200.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Beneš M. Forenzní analýza v operačních systémech Linux . [Thesis]. Brno University of Technology; 2012. Available from: http://hdl.handle.net/11012/55200

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


AUT University

26. Kyaw, Ar Kar. Digital Forensics in small devices: RFID tag investigation .

Degree: 2011, AUT University

 Read/Write Radio Frequency Identification (R/W RFID) chips are commonly used to tag stock in retail shops. The security risk of RFID has been well established… (more)

Subjects/Keywords: Network Forensics; Live Memory Forensics; RFID tag investigation; RFID BS Security Risk; Digital evidence; RFID Business System; Proposed reader log extraction tool; Customized incident Response Toolkits; Best practices; SQL poisoning; Business Information System; RFID Middleware; Stock Management System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kyaw, A. K. (2011). Digital Forensics in small devices: RFID tag investigation . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/1348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kyaw, Ar Kar. “Digital Forensics in small devices: RFID tag investigation .” 2011. Thesis, AUT University. Accessed April 05, 2020. http://hdl.handle.net/10292/1348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kyaw, Ar Kar. “Digital Forensics in small devices: RFID tag investigation .” 2011. Web. 05 Apr 2020.

Vancouver:

Kyaw AK. Digital Forensics in small devices: RFID tag investigation . [Internet] [Thesis]. AUT University; 2011. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10292/1348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kyaw AK. Digital Forensics in small devices: RFID tag investigation . [Thesis]. AUT University; 2011. Available from: http://hdl.handle.net/10292/1348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Windsor

27. Mackenzie, William Timothy. Digital pattern recognition: An investigation of the discriminatory properties exhibited by an information theoretical algorithm when applied to a differential function of pattern.

Degree: MA, Electrical and Computer Engineering, 1966, University of Windsor

Subjects/Keywords: A; ALGORITHM; APPLIED; DIFFERENTIAL; DIGITAL; DISCRIMINATORY; EXHIBITED; FUNCTION; INFORMATION; INVESTIGATION; PATTERN; PROPERTIES; RECOGNITION; THEORETICAL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mackenzie, W. T. (1966). Digital pattern recognition: An investigation of the discriminatory properties exhibited by an information theoretical algorithm when applied to a differential function of pattern. (Masters Thesis). University of Windsor. Retrieved from https://scholar.uwindsor.ca/etd/6434

Chicago Manual of Style (16th Edition):

Mackenzie, William Timothy. “Digital pattern recognition: An investigation of the discriminatory properties exhibited by an information theoretical algorithm when applied to a differential function of pattern.” 1966. Masters Thesis, University of Windsor. Accessed April 05, 2020. https://scholar.uwindsor.ca/etd/6434.

MLA Handbook (7th Edition):

Mackenzie, William Timothy. “Digital pattern recognition: An investigation of the discriminatory properties exhibited by an information theoretical algorithm when applied to a differential function of pattern.” 1966. Web. 05 Apr 2020.

Vancouver:

Mackenzie WT. Digital pattern recognition: An investigation of the discriminatory properties exhibited by an information theoretical algorithm when applied to a differential function of pattern. [Internet] [Masters thesis]. University of Windsor; 1966. [cited 2020 Apr 05]. Available from: https://scholar.uwindsor.ca/etd/6434.

Council of Science Editors:

Mackenzie WT. Digital pattern recognition: An investigation of the discriminatory properties exhibited by an information theoretical algorithm when applied to a differential function of pattern. [Masters Thesis]. University of Windsor; 1966. Available from: https://scholar.uwindsor.ca/etd/6434


Queensland University of Technology

28. Allinson, Caroline Linda. Legislative and security requirements of audit material for evidentiary purpose.

Degree: 2004, Queensland University of Technology

 This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the… (more)

Subjects/Keywords: computer security; evidence preservation Australia; criminal investigation Australia; law enforcement; audit trails; evidence; investigation; expert witness; information security; policy; court; survey; computer; forensic computer examination; digital evidence; auditing; electronic records

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Allinson, C. L. (2004). Legislative and security requirements of audit material for evidentiary purpose. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/36813/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Allinson, Caroline Linda. “Legislative and security requirements of audit material for evidentiary purpose.” 2004. Thesis, Queensland University of Technology. Accessed April 05, 2020. https://eprints.qut.edu.au/36813/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Allinson, Caroline Linda. “Legislative and security requirements of audit material for evidentiary purpose.” 2004. Web. 05 Apr 2020.

Vancouver:

Allinson CL. Legislative and security requirements of audit material for evidentiary purpose. [Internet] [Thesis]. Queensland University of Technology; 2004. [cited 2020 Apr 05]. Available from: https://eprints.qut.edu.au/36813/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Allinson CL. Legislative and security requirements of audit material for evidentiary purpose. [Thesis]. Queensland University of Technology; 2004. Available from: https://eprints.qut.edu.au/36813/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Wilson, Peter J. A Forensic Comparison: Windows 7 and Windows 8.

Degree: MS, Department of Computing Security (GCCIS), 2013, Rochester Institute of Technology

  Whenever a new operating system or new version of an operating system is released, forensic investigators must re-examine the new operating system or new… (more)

Subjects/Keywords: Microsoft Windows (Computer file) – Security measures; Computer crimes – Investigation – Research; Computer forensics; Digital forensics; Windows 7; Windows 8; Information Security

…I followed a standard forensic investigation procedure of Data Collection, Data… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wilson, P. J. (2013). A Forensic Comparison: Windows 7 and Windows 8. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/970

Chicago Manual of Style (16th Edition):

Wilson, Peter J. “A Forensic Comparison: Windows 7 and Windows 8.” 2013. Masters Thesis, Rochester Institute of Technology. Accessed April 05, 2020. https://scholarworks.rit.edu/theses/970.

MLA Handbook (7th Edition):

Wilson, Peter J. “A Forensic Comparison: Windows 7 and Windows 8.” 2013. Web. 05 Apr 2020.

Vancouver:

Wilson PJ. A Forensic Comparison: Windows 7 and Windows 8. [Internet] [Masters thesis]. Rochester Institute of Technology; 2013. [cited 2020 Apr 05]. Available from: https://scholarworks.rit.edu/theses/970.

Council of Science Editors:

Wilson PJ. A Forensic Comparison: Windows 7 and Windows 8. [Masters Thesis]. Rochester Institute of Technology; 2013. Available from: https://scholarworks.rit.edu/theses/970


Bucknell University

30. Meng, Max Byron. Understanding the Deeply Engaged Mindset Among Active Bucknell Students.

Degree: 2015, Bucknell University

 This thesis reports on a qualitative phenomenological investigation of the personal experiences of nine undergraduate students who attended Bucknell University, chosen on the basis of… (more)

Subjects/Keywords: Authentic helpfulness; Digital ecosystem; Collaborative learning; College students; Facebook; Higher education; Hootsuite; Hyper-connectedness; Identity development; Klout Score; Meaningful content; Millennial Generation; Millennials; Online engagement; Phenomenological investigation; Qualitative; Relevant audience; Self-presentation; Social analytic metrics; Social influence; Social integration; Social media; Social networking platforms; Social student engagement; Student affairs; Student collaboration; Student engagement; Student involvement; Student success; Twitter

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meng, M. B. (2015). Understanding the Deeply Engaged Mindset Among Active Bucknell Students. (Thesis). Bucknell University. Retrieved from https://digitalcommons.bucknell.edu/masters_theses/137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Meng, Max Byron. “Understanding the Deeply Engaged Mindset Among Active Bucknell Students.” 2015. Thesis, Bucknell University. Accessed April 05, 2020. https://digitalcommons.bucknell.edu/masters_theses/137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Meng, Max Byron. “Understanding the Deeply Engaged Mindset Among Active Bucknell Students.” 2015. Web. 05 Apr 2020.

Vancouver:

Meng MB. Understanding the Deeply Engaged Mindset Among Active Bucknell Students. [Internet] [Thesis]. Bucknell University; 2015. [cited 2020 Apr 05]. Available from: https://digitalcommons.bucknell.edu/masters_theses/137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Meng MB. Understanding the Deeply Engaged Mindset Among Active Bucknell Students. [Thesis]. Bucknell University; 2015. Available from: https://digitalcommons.bucknell.edu/masters_theses/137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.