In this research work, we propose an underlay based on Kubernetes to enhance the scalable fault tolerance of the General Intensional Programming System's distributed run-time demand-driven backend to gather digital evidence from GitHub repositories and encode them in Forensic Lucid for further analysis in the integrated OpenTDIP environment. We developed a solution so that forensic investigators could use GitHub to gather a dataset to investigate program flaws and vulnerabilities related to security from GitHub projects written in different programming languages. For this purpose, we design and implement a JSON demand-driven encoder to perform a Forensic Lucid conversion pipeline (data extraction, format conversion, and file compilation). ...
When computer forensics investigation is carried out on single workstations and the forensics image...
Digital forensics is the science involved in the discovery, preservation, and analysis of evidence o...
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of ...
In this research work, we propose an underlay based on Kubernetes to enhance the scalable fault tole...
Intensional programming is a declarative programming paradigm that is suitable for scientific progra...
abstract: In order to catch the smartest criminals in the world, digital forensics examiners need a ...
This work focuses on the application of the intensional logic to cyberforensic analysis and its bene...
This work highlights and takes aim at the most critical security aspects required for two different ...
This dissertation evaluates the following thesis statement: Program analysis techniques can enable a...
Abstract Peer to Peer(P2P) file sharing networks are amongst the best free sources of information on...
The proliferation of binary-only program analysis techniques like fuzz testing and symbolic analysis...
[Abstract] Computer Forensics is a science that is part of computer security and focuses on identif...
The Hadoop framework has become the most deployed platform for processing Big Data. Despite its adva...
Rapid growth in Cloud computing and Internet of Things (IoT) introduces new vulnerabilities that can...
Cybercrime has been a growing concern for the past two decades. What used to be the responsibility o...
When computer forensics investigation is carried out on single workstations and the forensics image...
Digital forensics is the science involved in the discovery, preservation, and analysis of evidence o...
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of ...
In this research work, we propose an underlay based on Kubernetes to enhance the scalable fault tole...
Intensional programming is a declarative programming paradigm that is suitable for scientific progra...
abstract: In order to catch the smartest criminals in the world, digital forensics examiners need a ...
This work focuses on the application of the intensional logic to cyberforensic analysis and its bene...
This work highlights and takes aim at the most critical security aspects required for two different ...
This dissertation evaluates the following thesis statement: Program analysis techniques can enable a...
Abstract Peer to Peer(P2P) file sharing networks are amongst the best free sources of information on...
The proliferation of binary-only program analysis techniques like fuzz testing and symbolic analysis...
[Abstract] Computer Forensics is a science that is part of computer security and focuses on identif...
The Hadoop framework has become the most deployed platform for processing Big Data. Despite its adva...
Rapid growth in Cloud computing and Internet of Things (IoT) introduces new vulnerabilities that can...
Cybercrime has been a growing concern for the past two decades. What used to be the responsibility o...
When computer forensics investigation is carried out on single workstations and the forensics image...
Digital forensics is the science involved in the discovery, preservation, and analysis of evidence o...
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of ...