Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 693
1.
  • The procedures of the colle... The procedures of the collection of digital evidences in Arab Convention on Combating Information Technology Offences
    خيدل أحمد; كيسي زهيرة Mağallaẗ al-iğtihād li-l-dirāsāt al-qānūniyyaẗ wa al-iqtiṣādiyyaẗ, 01/2022, Letnik: 11, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    This article deals with the provisions in arab convention on combating information technology offences, and pertaining to measures for the collection of digital evidences of offences committed by ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
2.
  • Transnational gathering of electronic evidences: challenges and perspectives in the European Union
    Armen OGANESEAN Revista Institutului Naţional de Justiţie, 10/2022, Letnik: 14, Številka: 3
    Journal Article
    Odprti dostop

    It is well-known that transnational data flows are rising simultaneously with the increasing use of social media, webmail, messaging services, and apps to communicate, work, socialize and gain ...
Celotno besedilo
Dostopno za: NUK, PRFLJ, UL, UM, UPUK
3.
  • Sufficiency of Windows Even... Sufficiency of Windows Event Log as Evidence in Digital Forensics
    Ibrahim, Nurdeen M.; Al-Nemrat, Ameer; Jahankhani, Hamid ... Global Security, Safety and Sustainability & e-Democracy
    Book Chapter
    Odprti dostop

    The prevalence of computer and the internet has brought forth the increasing spate of cybercrime activities; hence the need for evidence to attribute a crime to a suspect. The research therefore, ...
Celotno besedilo

PDF
4.
  • Data Acquisition based Seizure Record Framework for Digital Forensics Investigations
    Pedapudi, Srinivasa Murthy; Vadlamani, Nagalakshmi 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2021-Dec.-2
    Conference Proceeding

    In the computer era, various digital devices are used along with networking technology for data communication in secured manner. But sometimes these systems are misused by the attackers. Information ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
5.
  • Raspberry Pi Forensic Investigation and Evidence Preservation using Blockchain
    Rekha, G.; Maheswari, B Uma 2021 International Conference on Forensics, Analytics, Big Data, Security (FABS), 2021-Dec.-21, Letnik: 1
    Conference Proceeding

    The adoption of Internet of Things (IoT) devices in numerous industries is rising rapidly these days, particularly in health care industry. The volume of data transmitted by these devices is ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
6.
  • Using Traces from IoT Devices to Solve Criminal Cases
    do Valle, Joao Marcos; Souza, Gabriel; Cacho, Nelio ... 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020-June
    Conference Proceeding

    During a criminal investigation, the evidence collection process produces an enormous amount of data. These data are present in many medias and IoT devices that are extracted as crime evidences (USB ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
7.
  • Big Data Platform for Analysing Crime Evidences
    do Valle, Joao Marcos; Souza, Gabriel; Fidelis, Samuel ... 2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService)
    Conference Proceeding

    During a criminal investigation, the evidence collection process produces an enormous amount of data. These data are present in many medias that are extracted as crime evidences (USB flash drives, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
8.
  • Disk memory forensics: Analysis of memory forensics frameworks flow
    Prem, T.; Selwin, V. Paul; Mohan, Ashok Kumar 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 2017-April
    Conference Proceeding

    We have heard of Cyber Espionage where a spy was able to hide data and go unnoticed virtually. Using some forensics frameworks we can able to hide and retrieve data in any format both in Windows and ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
9.
  • An insight into digital forensics branches and tools
    Kumari, Noble; Mohapatra, A. K. 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 03/2016
    Conference Proceeding

    As the adoption of the Ubiquitous Computing is growing with accelerated pace, cyber crime is also expanding and crime investigation is maturing into a more challenging issue which needs to be ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
10.
  • A Framework to Analyze Reliability of Digital Evidences in Computer Systems
    Zhiyan Zhao 2015 Sixth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA), 08/2015
    Conference Proceeding

    Electronic devices can be seen everywhere in our lives along with the popularization and application of computer technology, meanwhile more and more digital traces are found in criminal activities, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
1 2 3 4 5
zadetkov: 693

Nalaganje filtrov