UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1
zadetkov: 6
1.
  • Decrypting IndexedDB in pri... Decrypting IndexedDB in private mode of Gecko-based browsers
    Kim, Dohun; Lee, Sangjin; Park, Jungheum Forensic Science International: Digital Investigation, July 2024, Letnik: 49
    Journal Article
    Recenzirano
    Odprti dostop

    Various technical and legal issues hinder direct investigation on cloud services, which facilitates alternative approach to investigate services through artifacts left by web browsers. Among diverse ...
Celotno besedilo
2.
  • Microsoft Teams desktop app... Microsoft Teams desktop application forensic investigations utilizing IndexedDB storage
    Paligu, Furkan; Varol, Cihan Journal of forensic sciences, July 2022, Letnik: 67, Številka: 4
    Journal Article
    Recenzirano

    While the COVID‐19 virus remolded the routines of the establishments, remote collaboration and distant communication gained more popularity. As the way electronic communications are handled changes ...
Celotno besedilo
3.
  • BrowStExPlus: A Tool to Agg... BrowStExPlus: A Tool to Aggregate IndexedDB Artifacts for Forensic Analysis
    Paligu, Furkan; Kumar, Avinash; Cho, Hyuk ... Journal of forensic sciences, September 2019, 2019-Sep, 20190901, Letnik: 64, Številka: 5
    Journal Article
    Recenzirano

    As the Internet and World Wide Web have rapidly evolved and revolutionized the applications in everyday life, it is a demanding challenge for investigators to keep up with the emerging technologies ...
Celotno besedilo
4.
  • I Know What You Did Last Su... I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild
    Belloro, Stefano; Mylonas, Alexios IEEE access, 01/2018, Letnik: 6
    Journal Article
    Recenzirano
    Odprti dostop

    As the usage of the Web increases, so do the threats an everyday user faces. One of the most pervasive threats a Web user faces is tracking, which enables an entity to gain unauthorized access to the ...
Celotno besedilo

PDF
5.
Celotno besedilo
6.
Celotno besedilo

PDF
1
zadetkov: 6

Nalaganje filtrov