A Forensic Methodology for Analyzing Nintendo 3DS Devices (Englisch)
- Neue Suche nach: Read, Huw
- Neue Suche nach: Thomas, Elizabeth
- Neue Suche nach: Sutherland, Iain
- Neue Suche nach: Xynos, Konstantinos
- Neue Suche nach: Burgess, Mikhaila
- Neue Suche nach: Peterson, Gilbert
- Neue Suche nach: Shenoi, Sujeet
- Neue Suche nach: Read, Huw
- Neue Suche nach: Thomas, Elizabeth
- Neue Suche nach: Sutherland, Iain
- Neue Suche nach: Xynos, Konstantinos
- Neue Suche nach: Burgess, Mikhaila
In:
Advances in Digital Forensics XII
: 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers
;
Kapitel: 7
;
127-143
;
2016
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A Forensic Methodology for Analyzing Nintendo 3DS Devices
-
Weitere Titelangaben:IFIP Advs Information
-
Beteiligte:Peterson, Gilbert ( Herausgeber:in ) / Shenoi, Sujeet ( Herausgeber:in ) / Read, Huw ( Autor:in ) / Thomas, Elizabeth ( Autor:in ) / Sutherland, Iain ( Autor:in ) / Xynos, Konstantinos ( Autor:in ) / Burgess, Mikhaila ( Autor:in )
-
Kongress:IFIP International Conference on Digital Forensics ; 2016 ; New Delhi, India
-
Erschienen in:Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ; Kapitel: 7 ; 127-143IFIP Advances in Information and Communication Technology ; 484 ; 127-143
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:20.09.2016
-
Format / Umfang:17 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
On a Scientific Theory of Digital ForensicsOlivier, Martin et al. | 2016
- 2
-
Data Privacy Perceptions About Digital Forensic Investigations in IndiaVerma, Robin / Govindaraj, Jayaprakash / Gupta, Gaurav et al. | 2016
- 3
-
A Framework for Assessing the Core Capabilities of a Digital Forensic OrganizationAlmarzooqi, Ahmed / Jones, Andrew et al. | 2016
- 4
-
Optimizing Short Message Text Sentiment Analysis for Mobile Device ForensicsAboluwarin, Oluwapelumi / Andriotis, Panagiotis / Takasu, Atsuhiro / Tryfonas, Theo et al. | 2016
- 5
-
Impact of User Data Privacy Management Controls on Mobile Device InvestigationsAndriotis, Panagiotis / Tryfonas, Theo et al. | 2016
- 6
-
Analyzing Mobile Device Ads to Identify UsersGovindaraj, Jayaprakash / Verma, Robin / Gupta, Gaurav et al. | 2016
- 7
-
A Forensic Methodology for Analyzing Nintendo 3DS DevicesRead, Huw / Thomas, Elizabeth / Sutherland, Iain / Xynos, Konstantinos / Burgess, Mikhaila et al. | 2016
- 8
-
Reconstructing Interactions with Rich Internet Applications from HTTP TracesBaghbanzadeh, Sara / Hooshmand, Salman / Bochmann, Gregor / Jourdan, Guy-Vincent / Mirtaheri, Seyed / Faheem, Muhammad / Onut, Iosif Viorel et al. | 2016
- 9
-
Reconstructing Tabbed Browser Sessions Using Metadata AssociationsRaghavan, Sriram / Raghavan, S. V. et al. | 2016
- 10
-
A Probabilistic Network Forensic Model for Evidence AnalysisLiu, Changwei / Singhal, Anoop / Wijesekera, Duminda et al. | 2016
- 11
-
API-Based Forensic Acquisition of Cloud DrivesRoussev, Vassil / Barreto, Andres / Ahmed, Irfan et al. | 2016
- 12
-
The Cloud Storage Ecosystem – A New Business Model for Internet Piracy?Chan, Raymond / Chow, Kam-Pui / Chan, Vivien / Kwan, Michael et al. | 2016
- 13
-
Windows 8.x Facebook and Twitter Metro App ArtifactsBhushan Deb, Swasti et al. | 2016
- 14
-
Profiling Flash Mob Organizers in Web Discussion ForumsChan, Vivien / Chow, Kam-Pui / Chan, Raymond et al. | 2016
- 15
-
Enhancing Image Forgery Detection Using 2-D Cross ProductsTeerakanok, Songpon / Uehara, Tetsutaro et al. | 2016
- 16
-
Forensic Authentication of Bank ChecksKumar, Rajesh / Gupta, Gaurav et al. | 2016
- 17
-
Data Type Classification: Hierarchical Class-to-Type ModelingBeebe, Nicole / Liu, Lishu / Sun, Minghe et al. | 2016
- 18
-
Secure File Deletion for Solid State DrivesSingh, Bhupendra / Saharan, Ravi / Somani, Gaurav / Gupta, Gaurav et al. | 2016
- 19
-
A Tool for Volatile Memory Acquisition from Android DevicesYang, Haiyu / Zhuge, Jianwei / Liu, Huiming / Liu, Wei et al. | 2016
- 20
-
Advanced Automated Disk Investigation ToolkitKarabiyik, Umit / Aggarwal, Sudhir et al. | 2016