Behavioral-Anomaly Detection in Forensics Analysis (original) (raw)

Profile image of Mauro MigliardiMauro Migliardi

2019, IEEE Security & Privacy

visibility

description

9 pages

link

1 file

Sign up for access to the world's latest research

checkGet notified about relevant papers

checkSave papers to use in your research

checkJoin the discussion with peers

checkTrack your impact

Sign up for access to the world's latest research

Digital Forensics to Intelligent Forensics

Alastair Irons

Future Internet, 2014

View PDFchevron_right

A method for reducing the risk of errors in digital forensic investigations

Paul Vickers

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012

View PDFchevron_right

A Survey on Anomaly Detection Strategies

Mohammad Arefin

Lecture Notes in Networks and Systems, 2021

View PDFchevron_right

Forensic Science - Peering down a Blind Alley

Brian J Ford

View PDFchevron_right

Overview of the Forensic Investigation of Cloud Services

tahar Kechadi

2015 10th International Conference on Availability, Reliability and Security, 2015

View PDFchevron_right

Traceability in digital forensic investigation process

Mohd Abdollah

2011 IEEE Conference on Open Systems, 2011

View PDFchevron_right

Forensic Science International: Reports

ASHA S H A B A N I RIPANDA, Said Vuai

View PDFchevron_right

Audits and root cause analysis

Randy Roig

Environmental Quality Management, 1994

View PDFchevron_right

Bridging the law and forensic science divide

Carole McCartney

Teaching Evidence Law, 2020

View PDFchevron_right

The Role of Digital Forensic Analysis in Modern Investigations

ilker ali

Journal of emerging computer technologies, 2024

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Rare combination of anomalies and its management with conservative and effective approach

MINATI CHOUDHURY

Journal of Human Reproductive Sciences, 2016

View PDFchevron_right

Investigation Investigation Techniques Technique investigation

Pieter van Gelder

Safety of historical stone arch bridges, 2009

View PDFchevron_right

A Forensic Traceability Index in Digital Forensic Investigation

Robiah Yusof

Journal of Information Security, 2013

View PDFchevron_right

Standard implementation in Cloud forensics

Mladen Veinović

Proceedings of the International Scientific Conference - Synthesis 2015, 2015

View PDFchevron_right

Quantification of digital forensic hypotheses using probability theory

Richard Overill

2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), 2013

View PDFchevron_right

Handbook of Forensic Sociology and Psychology

Stephen Morewitz

2014

View PDFchevron_right

A Systematic Literature Review in Cyber Forensics: Current Trends from the Client Perspective

IRENE PRISCILA CEDILLO ORELLANA

2018 IEEE Third Ecuador Technical Chapters Meeting (ETCM)

View PDFchevron_right

DEEP: Extending the Digital Forensics Process Model for Criminal Investigations

Richard Overill

ATHENS JOURNAL OF SCIENCES, 2020

View PDFchevron_right

Enhancing the security of IOT in forensics

Mehroush Banday

2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN)

View PDFchevron_right

The forensic accounting and corporate fraud

Joshua O Imoniana

Journal of Information Systems and Technology Management, 2013

View PDFchevron_right

Handbook of Forensic Mental Health Services

Alana Cook

Handbook of Forensic Mental Health Services, 2017

View PDFchevron_right

MICROBIAL FORENSICS THIRD EDITION

Dragutin Petrić

View PDFchevron_right

Sequential Anomaly Detection in the Presence of Noise and Limited Feedback

Jorge Silva

IEEE Transactions on Information Theory, 2012

View PDFchevron_right

Review of Cloud Forensics: Challenges, Solutions and Comparative Analysis

POORVI JAIN

International Journal of Computer Applications, 2019

View PDFchevron_right

Introduction: Special section - Group Analysis in Forensic Settings

Estela Welldon

Group Analysis, 2006

View PDFchevron_right

Relative novelty detection

Alex Smola

2009

View PDFchevron_right

Original Paper Remarks on the scientific exploration of “anomalous”

silvio chibeni

2015

View PDFchevron_right

Chapter II: Structure of Investigation

Larry Gross

mediastudies.press eBooks, 2023

View PDFchevron_right

Forensic Anthropology in Cold Cases

Madeleine Hinkes

2017

View PDFchevron_right

Abnormality analysis of streamed log data

Ashot Harutyunyan

2014 IEEE Network Operations and Management Symposium (NOMS), 2014

View PDFchevron_right

New Vision of Computer Forensic Science: Need of Cyber Crime Law

Pradeep Tomar

The Internet Journal of Law, Healthcare and Ethics, 2007

View PDFchevron_right

The Wa y of Handling Evidence of Criminal Offences of Computer Crime

Aleksandar Ivanovic

2018

View PDFchevron_right

Technology Corner: Analysing E-Mail Headers for Forensic Investigation

M Tariq Banday

Journal of Digital Forensics, Security and Law, 2011

View PDFchevron_right

Digital forensic readiness in a cloud environment

H. Venter

2013 Africon, 2013

View PDFchevron_right

The Characteristics of Forensic Audit and Differences in Relation to External Audit

Predrag M Vukadinović

Proceedings of the 1st International Scientific Conference - FINIZ 2015, 2015

View PDFchevron_right

Computer ScienceComputer ForensicsComputer SecurityAnomaly DetectionData Format