Behavioral-Anomaly Detection in Forensics Analysis (original) (raw)
2019, IEEE Security & Privacy
visibility
…
description
9 pages
link
1 file
Sign up for access to the world's latest research
checkGet notified about relevant papers
checkSave papers to use in your research
checkJoin the discussion with peers
checkTrack your impact
Sign up for access to the world's latest research
Related papers
Digital Forensics to Intelligent Forensics
Future Internet, 2014
A method for reducing the risk of errors in digital forensic investigations
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012
A Survey on Anomaly Detection Strategies
Lecture Notes in Networks and Systems, 2021
Forensic Science - Peering down a Blind Alley
Overview of the Forensic Investigation of Cloud Services
2015 10th International Conference on Availability, Reliability and Security, 2015
Traceability in digital forensic investigation process
2011 IEEE Conference on Open Systems, 2011
Forensic Science International: Reports
ASHA S H A B A N I RIPANDA, Said Vuai
Audits and root cause analysis
Environmental Quality Management, 1994
Bridging the law and forensic science divide
Teaching Evidence Law, 2020
The Role of Digital Forensic Analysis in Modern Investigations
Journal of emerging computer technologies, 2024
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Related papers
Rare combination of anomalies and its management with conservative and effective approach
Journal of Human Reproductive Sciences, 2016
Investigation Investigation Techniques Technique investigation
Safety of historical stone arch bridges, 2009
A Forensic Traceability Index in Digital Forensic Investigation
Journal of Information Security, 2013
Standard implementation in Cloud forensics
Proceedings of the International Scientific Conference - Synthesis 2015, 2015
Quantification of digital forensic hypotheses using probability theory
2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), 2013
Handbook of Forensic Sociology and Psychology
2014
A Systematic Literature Review in Cyber Forensics: Current Trends from the Client Perspective
IRENE PRISCILA CEDILLO ORELLANA
2018 IEEE Third Ecuador Technical Chapters Meeting (ETCM)
DEEP: Extending the Digital Forensics Process Model for Criminal Investigations
ATHENS JOURNAL OF SCIENCES, 2020
Enhancing the security of IOT in forensics
2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN)
The forensic accounting and corporate fraud
Journal of Information Systems and Technology Management, 2013
Handbook of Forensic Mental Health Services
Handbook of Forensic Mental Health Services, 2017
MICROBIAL FORENSICS THIRD EDITION
Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
IEEE Transactions on Information Theory, 2012
Review of Cloud Forensics: Challenges, Solutions and Comparative Analysis
International Journal of Computer Applications, 2019
Introduction: Special section - Group Analysis in Forensic Settings
Group Analysis, 2006
2009
Original Paper Remarks on the scientific exploration of “anomalous”
2015
Chapter II: Structure of Investigation
mediastudies.press eBooks, 2023
Forensic Anthropology in Cold Cases
2017
Abnormality analysis of streamed log data
2014 IEEE Network Operations and Management Symposium (NOMS), 2014
New Vision of Computer Forensic Science: Need of Cyber Crime Law
The Internet Journal of Law, Healthcare and Ethics, 2007
The Wa y of Handling Evidence of Criminal Offences of Computer Crime
2018
Technology Corner: Analysing E-Mail Headers for Forensic Investigation
Journal of Digital Forensics, Security and Law, 2011
Digital forensic readiness in a cloud environment
2013 Africon, 2013
The Characteristics of Forensic Audit and Differences in Relation to External Audit
Proceedings of the 1st International Scientific Conference - FINIZ 2015, 2015
Related topics
Computer ScienceComputer ForensicsComputer SecurityAnomaly DetectionData Format