BREDOLAB: Shopping in the Cybercrime Underworld (Englisch)
- Neue Suche nach: Graaf, Daan
- Neue Suche nach: Shosha, Ahmed F.
- Neue Suche nach: Gladyshev, Pavel
- Neue Suche nach: Graaf, Daan
- Neue Suche nach: Shosha, Ahmed F.
- Neue Suche nach: Gladyshev, Pavel
In:
Digital Forensics and Cyber Crime
7
;
302-313
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:BREDOLAB: Shopping in the Cybercrime Underworld
-
Beteiligte:
-
Erschienen in:Digital Forensics and Cyber Crime , 7 ; 302-313
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary AnalysisRuan, Keyun / Carthy, Joe et al. | 2013
- 22
-
Cloud Forensic Maturity ModelRuan, Keyun / Carthy, Joe et al. | 2013
- 42
-
Identifying Remnants of Evidence in the CloudKoppen, Jeremy / Gent, Gerald / Bryan, Kevin / DiPippo, Lisa / Kramer, Jillian / Moreland, Marquita / Fay-Wolfe, Victor et al. | 2013
- 58
-
On Improving Authorship Attribution of Source CodeTennyson, Matthew F. et al. | 2013
- 66
-
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation PurposesShosha, Ahmed F. / James, Joshua I. / Hannaway, Alan / Liu, Chen-Ching / Gladyshev, Pavel et al. | 2013
- 81
-
Measuring the Preference of Image Content for Self-reported Consumers of Child PornographySeigfried-Spellar, Kathryn C. et al. | 2013
- 91
-
Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory StudyBaggili, Ibrahim / Shamlan, Moza / Jabri, Bedoor / Zaabi, Ayesha et al. | 2013
- 109
-
When Should Virtual Cybercrime Be Brought under the Scope of the Criminal Law?Strikwerda, Litska et al. | 2013
- 144
-
Research Trends in Digital Forensic Science: An Empirical Analysis of Published ResearchBaggili, Ibrahim / BaAbdallah, Afrah / Al-Safi, Deena / Marrington, Andrew et al. | 2013
- 158
-
Face Recognition Based on Wavelet Transform and Adaptive Local Binary PatternMohamed, Abdallah / Yampolskiy, Roman V. et al. | 2013
- 167
-
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2Breitinger, Frank / Baier, Harald et al. | 2013
- 183
-
Investigating File Encrypted Material Using NTFS $logfileMcGrath, Niall / Gladyshev, Pavel et al. | 2013
- 204
-
Finding Data in DNA: Computer Forensic Investigations of Living OrganismsBeck, Marc B. / Rouchka, Eric C. / Yampolskiy, Roman V. et al. | 2013
- 220
-
On the Completeness of Reconstructed Data for Database ForensicsAdedayo, Oluwasola Mary / Olivier, Martin S. et al. | 2013
- 239
-
BlackBerry PlayBook Backup Forensic AnalysisMarzougy, Mohamed Al / Baggili, Ibrahim / Marrington, Andrew et al. | 2013
- 253
-
ANTS ROAD: A New Tool for SQLite Data Recovery on Android DevicesAouad, Lamine M. / Kechadi, Tahar M. / Russo, Roberto et al. | 2013
- 264
-
Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative AnalysisSaleem, Shahzad / Popov, Oliver / Appiah-Kubi, Oheneba Kwame et al. | 2013
- 283
-
Detection of Masqueraded Wireless Access Using 802.11 MAC Layer FingerprintsIdland, Christer / Jelle, Thomas / Mjølsnes, Stig F. et al. | 2013
- 302
-
BREDOLAB: Shopping in the Cybercrime UnderworldGraaf, Daan / Shosha, Ahmed F. / Gladyshev, Pavel et al. | 2013
- 314
-
A Review and Comparative Study of Digital Forensic Investigation ModelsKyei, Kwaku / Zavarsky, Pavol / Lindskog, Dale / Ruhl, Ron et al. | 2013