The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. VoIP provides strong encryption and a decentralised databased network. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. New methods are required to collect evidence from systems running VoIP software. This paper presents work in progress and, based on a literature review of the field, explores a methodology that may be used to advance this research area
Of the many notebook computers which are stolen, a large number are subsequently recovered. However,...
National audienceThe "bridgeness" centrality metric is briefly introduced. A temporal dynamic networ...
When most people go to the trouble of getting erasure tools to remove data from their hard drives th...
The issues faced by law enforcement authorities concerning VoIP are very different from that of trad...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Microsoft’s upcoming operating system release, Windows Vista, contains the option to encrypt all inf...
The process of validating the correct operation of software is difficult for a variety of reasons. T...
Programmers of forensic tools need to ensure that their tools are of suitable use, robustness and co...
This paper will discuss honeypots and their use and effectiveness as a security measure in an IT env...
Consumers require personal firewalls that are highly secure, easy to use, configurable and uptodate ...
Records management practices are mandatory in many business and government operations. Records manag...
This paper investigates the risks and vulnerabilities associated to the security of the WiMAX/802.16...
Programmers of forensic tools need to ensure that their tools are of suitable use, robustness and co...
Information systems are used in overt and covert conflict and information operations target an oppon...
Of the many notebook computers which are stolen, a large number are subsequently recovered. However,...
National audienceThe "bridgeness" centrality metric is briefly introduced. A temporal dynamic networ...
When most people go to the trouble of getting erasure tools to remove data from their hard drives th...
The issues faced by law enforcement authorities concerning VoIP are very different from that of trad...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Microsoft’s upcoming operating system release, Windows Vista, contains the option to encrypt all inf...
The process of validating the correct operation of software is difficult for a variety of reasons. T...
Programmers of forensic tools need to ensure that their tools are of suitable use, robustness and co...
This paper will discuss honeypots and their use and effectiveness as a security measure in an IT env...
Consumers require personal firewalls that are highly secure, easy to use, configurable and uptodate ...
Records management practices are mandatory in many business and government operations. Records manag...
This paper investigates the risks and vulnerabilities associated to the security of the WiMAX/802.16...
Programmers of forensic tools need to ensure that their tools are of suitable use, robustness and co...
Information systems are used in overt and covert conflict and information operations target an oppon...
Of the many notebook computers which are stolen, a large number are subsequently recovered. However,...
National audienceThe "bridgeness" centrality metric is briefly introduced. A temporal dynamic networ...
When most people go to the trouble of getting erasure tools to remove data from their hard drives th...