LimonDroid: a system coupling three signature-based schemes for profiling Android malware
F Tchakounté, RCN Ngassi, VC Kamla… - Iran Journal of Computer …, 2021 - Springer
Android remains an interesting target to attackers due to its openness. A contribution in the
literature consists of providing similarity measurement such as fuzzy hashing to fight against …
literature consists of providing similarity measurement such as fuzzy hashing to fight against …
Holistic analytics of digital artifacts: unique metadata association model
Investigation of every crime scene with digital evidence is predominantly required in
identifying almost all atomic files behind the scenes that have been intentionally scrubbed …
identifying almost all atomic files behind the scenes that have been intentionally scrubbed …
Ensure the validity of forensic evidence by using a hash function
K Aishwarya Lakshmi, PB Honnavali… - … : Proceedings of ICICCT …, 2021 - Springer
A hash function is a mathematical function used to identify and authenticate the file data.
Data corruption in forensic evidence will tamper the digital evidence and could mislead the …
Data corruption in forensic evidence will tamper the digital evidence and could mislead the …
Google Drive Forensics
P Balarezo - 2021 - search.proquest.com
Google Drive is a popular application that features online creation, storage, sharing, editing,
and deleting data. People and businesses are using Google Drive to conduct their daily …
and deleting data. People and businesses are using Google Drive to conduct their daily …
[PDF][PDF] A DIGITAL FORENSICS INVESTIGATION MODEL THAT INCORPORATES DIGITAL CHAIN OF CUSTODY FOR ITS INTEGRITY, AND AUTHENTICITY
Digital Forensics Investigation Models (DFIMs) are designed to assist investigators in
handling Digital Evidence (DE) related to computers and other digital media. Researchers …
handling Digital Evidence (DE) related to computers and other digital media. Researchers …
Técnicas de seguridad en redes de comunicaciones aplicadas a la custodia de evidencia digital
PS Haro Parra - 2021 - repositorio.puce.edu.ec
A medida que las nuevas tecnologías se extienden en las organizaciones con una creciente
influencia de transformación digital, los desafíos de seguridad comenzaron a identificar …
influencia de transformación digital, los desafíos de seguridad comenzaron a identificar …
[PDF][PDF] OFICINA DE POSTGRADOS
IVM Lara - 2022 - repositorio.puce.edu.ec
The main reason supporting this study, is the need institutions have to develop in the
financial-accounting field efficiently. In addition, to have internal control procedures or …
financial-accounting field efficiently. In addition, to have internal control procedures or …
[PDF][PDF] THE USE OF SOFTWARE AND HARDWARE VULNERABILITIES BY LAW ENFORCEMENT
W El Hammouti - 2019 - arno.uvt.nl
1.1 Background Vulnerabilities are often described as flaws or weaknesses in the code of a
software system or application and have been around for as long as computer systems have …
software system or application and have been around for as long as computer systems have …
Survey analysis of cloned SIM card
TKM Gudimalla, S Kannan - Proceedings of International …, 2019 - papers.ssrn.com
Cyber-attacks increase in many ways such as Smart Card Cloning, Social Engineering, and
Malware attacks, that eventually left millions of users prone to seizures. Currently, smart card …
Malware attacks, that eventually left millions of users prone to seizures. Currently, smart card …