Forensic Analysis of Windows Server 2008 Physical Memory (original) (raw)

On the Identification of Information Extracted from Windows Physical Memory

Funminiyi Olajide

International Journal for Information Security Research, 2012

View PDFchevron_right

A Novel Memory Forensics Technique for Windows 10.pdf

Publishing India Group

Journal of Network and Information Security, 2016

View PDFchevron_right

Windows memory forensics

Nicolas RUFF

2008

View PDFchevron_right

IRJET- Study of Memory Forensics: Memory Analysis Technique

IRJET Journal

IRJET, 2020

View PDFchevron_right

Study on Live analysis of Windows Physical Memory

Divyangsinh Rahevar

View PDFchevron_right

Detection of Windows Memory Anti Forensic Method

Shweta Chawla

2017

View PDFchevron_right

Comparative Study of Memory Forensics Based on KPCR in Different Versions of Windows

Journal of Computer Science IJCSIS

View PDFchevron_right

Extracting Forensic Artifacts from Windows O/S Memory

Gilbert Peterson

2011

View PDFchevron_right

FALI: Time Memory Information of Windows Computer Systems

F. Olajide

International Journal of Intelligent Computing Research, 2013

View PDFchevron_right

On The Analysis Of Information Found On Windows Application Memory

F. Olajide

International Journal of Intelligent Computing Research, 2013

View PDFchevron_right

Volatile Memory Forensics: A Legal Perspective

Harnoor Kaur

International Journal of Computer Applications, 2016

View PDFchevron_right

Windows operating systems agnostic memory analysis

Gilbert Peterson

Digital Investigation, 2010

View PDFchevron_right

Towards the Memory Forensics of MS Word Documents

Aseel Asad, Ziad Al-Sharif

View PDFchevron_right

Identifying and Finding Forensic Evidence From Windows Application

F. Olajide

Journal of Internet Technology and Secured Transaction, 2012

View PDFchevron_right

Hunting advanced volatile threats using memory forensics

Priya Gadgil

2018

View PDFchevron_right

Forensic extraction of user information in continuous block of evidence

Funminiyi Olajide

International Conference on Information Society (i-Society 2011), 2011

View PDFchevron_right

A study of application level information from the volatile memory of Windows computer systems

F. Olajide

2011

View PDFchevron_right

Digital Forensic Investigation for Non-Volatile Memory Architecture by Hybrid Evaluation Based on ISO/IEC 27037:2012 and NIST SP800-86 Framework

Dedy Hariyadi

IT Journal Research and Development, 2022

View PDFchevron_right

Memory Forensic Development and Challenges in Identifying Digital Crime : A Review

Yasep Azzery

TEKNOKOM, 2022

View PDFchevron_right

Characteristics and detectability of Windows auto-start extensibility points in memory forensics

Ricardo Jorge Rodríguez

Digital Investigation, 2019

View PDFchevron_right

Microsoft Windows Based Computer Forensic

ABDULLAHI MOHAMMED

View PDFchevron_right

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics

Ricci Ieong

2010

View PDFchevron_right

Investigating the PROCESS block for memory analysis

Ahmad Mahmood

2011

View PDFchevron_right

Forensic analysis of communication records of messaging applications from physical memory

David Duarte

Computers & Security, 2019

View PDFchevron_right

Object Signature Search for Capturing Processes Memory

Ahmad Mahmood

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

Utilizing Debugging Information of Applications in Memory Forensics

Ziad Al-Sharif

JUCS - Journal of Universal Computer Science

View PDFchevron_right

Forensic Investigation Utilizing RAM Capture to Decrypt Bitlocker Volumes: A Case Study

Bhushan Ghode

Journal of Emerging Technologies and Innovative Research , 2022

View PDFchevron_right

IJERT-Utilizing Event Logs of Windows Operating System in Digital Crime Investigations

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2021

View PDFchevron_right

Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging

Ron Ruhl

2011

View PDFchevron_right

Anti-forensic resilient memory acquisition

Michael Cohen

View PDFchevron_right

A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPS

Jayaprakash Govindaraj

IFIP Advances in Information and Communication Technology, 2015

View PDFchevron_right

Leveraging the Windows Amcache.hve File in Forensic Investigations

Upasna Singh

Journal of Digital Forensics, Security and Law

View PDFchevron_right

Extracting Windows command line details from physical memory

Eoghan Casey

Digital Investigation, 2010

View PDFchevron_right

Forensic Analysis of Jump Lists in Windows Operating System

kritarth jhala

International Journal of Engineering Research and, 2015

View PDFchevron_right

Digital Forensics through Application Behavior Analysis

Shuaibur Rahman

International Journal of Modern Education and Computer Science, 2016

View PDFchevron_right