Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4
zadetkov: 39
1.
  • A Novel Distributed File Sy... A Novel Distributed File System Using Blockchain Metadata
    Kumar, Deepa S.; Dija, S.; Sumithra, M. D. ... Wireless personal communications, 03/2023, Letnik: 129, Številka: 1
    Journal Article
    Recenzirano

    Cluster computing has become an inevitable part of data processing as the huge volume of data being produced from different sources like online social media, IoT, mobiledata, sensor data, black box ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
2.
  • Cyber Forensics: Discovering Traces of Malware on Windows Systems
    S, Dija; J, Ajana; V, Indu ... 2020 IEEE Recent Advances in Intelligent Computational Systems (RAICS), 2020-Dec.-3
    Conference Proceeding

    Malware Crimes are ubiquitous nowadays. One of the challenges faced by Cyber Forensics Investigators is to retrieve the details of a suspicious program, which might be malware, from a computer. ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
3.
  • Detection of spoofed mails Detection of spoofed mails
    Jayan, Aparna; Dija, S. 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 12/2015
    Conference Proceeding, Journal Article

    Cyber forensics deals with the collection of digital artifacts from digital devices that can be presented in the court as evidence. There are many areas of cyber forensics. Some of these are Disk ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
4.
  • Forensic Analysis of Google Chrome Cache Files
    Suma, G S; Dija, S; Pillai, Arun T 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2017-December
    Conference Proceeding

    Internet Forensics has become an indispensable part of Cyber Forensics. This is due to the rapid growth in the number of cybercrimes which are related to Internet usage. These crimes vary from ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
5.
  • Towards Live Forensic Acquisition & Analysis of Mac OS Systems
    Prasad, Eby; Dija, S; Dhana Lakshmi, M.P 2018 International CET Conference on Control, Communication, and Computing (IC4), 2018-July
    Conference Proceeding

    The Mac Operating System is a fork of UNIX OS that is widely used in Apple's computers known as Mac Books. The availability of tools for macOS forensics are in scarce. In addition to this, the macOS ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
6.
  • Windows 10 Cloud Storage and Social Media Application Forensics
    Darsana, M. S; Khosh, Vikhnesh A.M.; Dija, S ... 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2018-Dec.
    Conference Proceeding

    Cloud storage and Social Media Applications can be accessed by using various Web and Portable Browsers. These applications available in Windows 10 Operating System. The cloud storage and social media ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
7.
  • Extracting network connecti... Extracting network connections from Windows 7 64-bit physical memory
    Jaina, J.; Suma, G. S.; Dija, S. ... 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 12/2015
    Conference Proceeding, Journal Article

    Nowadays, Memory Forensics is more acceptable in Cyber Forensics Investigation because malware authors and attackers choose RAM or physical memory for storing critical information instead of hard ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
8.
  • The need to adopt agile met... The need to adopt agile methodology in the development of cyber forensics tools
    Balan, C.; Dija, S; Vidyadharan, Divya S. 2010 IEEE International Conference on Computational Intelligence and Computing Research, 2010-Dec.
    Conference Proceeding

    Cyber forensics is the process of seizure, acquisition and analysis of digital evidence. Development of cyber forensics tools is often challenging as more and more variations of digital devices are ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
9.
  • Multilingual search in cybe... Multilingual search in cyber forensic analysis
    Koshy, Jisha Ninan; Gonsalvez, Dagma D.; Dija, S. ... 2013 IEEE International Conference on Computational Intelligence and Computing Research, 12/2013
    Conference Proceeding

    In the present day scenario, large amount of information and data is being stored in the form of digital documents. Cyber forensics analysis tools need to deal with large volumes of data retrieved ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
10.
  • Web Browser Forensics for Retrieving Searched Keywords on the Internet
    Dija, S; Ajana, J; Indu, V ... 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 2021-Dec.-17
    Conference Proceeding

    Nowadays, most of the reported cybercrimes use the Internet. It is seen that Web Browsers leave forensically sound footprints of Internet browsing activities on the computer's storage media. The ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
1 2 3 4
zadetkov: 39

Nalaganje filtrov