This work was to investigate the forensics artifacts left by network attack tools within Linux and UNIX operating systems and to develop an application called HexaFind. The application enables a forensics investigator to collect the digital evidence left behind by the usage, installation or removal of specific attack tools. The main objective was to decrease the complexity of forensic investigations within these operating systems and to increase the detection rate of forensic artifacts relating to criminal or civil evidence of malicious conduct
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
Electronic crime is very difficult to investigate and prosecute, mainly due to the fact that investi...
The term digital forensics was first coined as a synonym for computer forensics. Since then, it hase...
As Linux-kernel-based operating systems proliferate there will be an inevitable increase in Linux sy...
Abstract: The field of computer forensics emerged in response to the substantial increase in compute...
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmi...
There is a risk whenever we use networks, computer systems and Internet technologies that things wil...
Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essenti...
In this primary work we call for the importance of integrating security testing into the process of ...
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images o...
Cyber-crime is becoming more widespread every day, and hackers are hitting organizations' IT infrast...
The BitTorrent client application is a popular utility for sharing large files over the Internet. So...
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital ev...
Static analysis of the Windows NTS File System (NTFS) which is the standard and most commonly used f...
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly b...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
Electronic crime is very difficult to investigate and prosecute, mainly due to the fact that investi...
The term digital forensics was first coined as a synonym for computer forensics. Since then, it hase...
As Linux-kernel-based operating systems proliferate there will be an inevitable increase in Linux sy...
Abstract: The field of computer forensics emerged in response to the substantial increase in compute...
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmi...
There is a risk whenever we use networks, computer systems and Internet technologies that things wil...
Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essenti...
In this primary work we call for the importance of integrating security testing into the process of ...
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images o...
Cyber-crime is becoming more widespread every day, and hackers are hitting organizations' IT infrast...
The BitTorrent client application is a popular utility for sharing large files over the Internet. So...
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital ev...
Static analysis of the Windows NTS File System (NTFS) which is the standard and most commonly used f...
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly b...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
Electronic crime is very difficult to investigate and prosecute, mainly due to the fact that investi...
The term digital forensics was first coined as a synonym for computer forensics. Since then, it hase...