Anti-computer forensics

Results: 41



#Item
1Computer forensics / Computer security / System software / Software / Anti-computer forensics / Forensic Toolkit / NTFS / Forensic science / FTK / Outline of forensic science

Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation Przemyslaw Pajek and Elias Pimenidis School of Computing IT and Engineering, University of East London, United Kingdom ,

Add to Reading List

Source URL: core.ac.uk

Language: English - Date: 2013-06-28 11:41:29
2Computer forensics / Digital forensics / Criminology / Anti-computer forensics / Forensic science / Database forensics

The Art of Defiling Defeating Forensic Analysis the grugq Overview 

Add to Reading List

Source URL: grugq.github.io

Language: English - Date: 2015-01-27 19:51:39
3Linear algebra / Vectors / Vector calculus / Machine learning / Computational linguistics / Speech synthesis / Speaker recognition / High-level synthesis / Euclidean vector / Vector space / Computer security / Linear subspace

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. X, NO. X, MONTH 20XX 1 Joint Speaker Verification and Anti-Spoofing in the i-Vector Space

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
4Computer forensics / AT Attachment / Host protected area / Information technology audit / Center for Advanced Security Research Darmstadt / Device configuration overlay / Baier / International Monetary Fund / Anti-computer forensics / IMF

AFAUC – anti-forensics of storage devices by alternative use of communication channels Harald Baier, Julian Knauer Hochschule Darmstadt, CASED

Add to Reading List

Source URL: www.imf-conference.org

Language: English - Date: 2014-05-21 12:58:53
5Validity / Technology / Counter forensics / Computer Online Forensic Evidence Extractor / Software / Software testing / USB flash drive / Validation / Anti-computer forensics / Computer forensics / Science / Pharmaceutical industry

Information at all.net12b http://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:08:42
6Computing / Anti-computer forensics / EnCase / Workbench / Disk formatting / Forensic science / System software / Computer forensics / Software

Computer Forensics – Tracking the Cyber vandals Martin Khoo, CISSP Assistant Director, Defence & Response Head, SingCERT Infocomm Development Authority of Singapore

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:23
7Exploit / Computer crimes / Identity theft / Anti-computer forensics / Hacker / Organized crime / Computer virus / Malware / Crime / Crimeware

Crimeware on the Net The “Behind the scenes” of the new web economy Iftach Ian Amit Director, Security Research – Finjan

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:30
8Steganography tools / Steganalysis / Anti-computer forensics / -graphy / OpenPuff / BPCS-Steganography / Cryptography / Espionage / Steganography

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:35
9Sri Lanka / Government / Asia / Indian Ocean / Department of Defense Cyber Crime Center / Anti-computer forensics / University of Colombo School of Computing / Forensic science / Colombo

PDF Document

Add to Reading List

Source URL: isif.asia

Language: English - Date: 2014-12-18 20:38:44
10Forensic science / EnCase / Forensic Toolkit / Anti-computer forensics / Department of Defense Cyber Crime Center / Computer forensics / Computer security / Law enforcement

PDF Document

Add to Reading List

Source URL: www.proofspace.com

Language: English - Date: 2013-06-11 17:06:55
UPDATE