Read the digital fingerprints: log analysis for digital forensics and security

被引:0
|
作者
Kara I. [1 ]
机构
[1] Karatekin University, Turkey
来源
Computer Fraud and Security | 2021年 / 2021卷 / 07期
关键词
D O I
10.1016/S1361-3723(21)00074-9
中图分类号
学科分类号
摘要
Computers and other related computing systems – such as smartphones and tablets – are indispensable in our daily lives. Unfortunately, this attracts the attention of cyber attackers. Everyone is affected. Computer systems used in sectors as diverse as the defence industry, healthcare enterprises, the entertainment sector, banking and education have been targeted by illegal attacks. © 2021 Elsevier Ltd
引用
收藏
页码:11 / 16
页数:5
相关论文
共 50 条
  • [2] Investigating digital fingerprints: Advanced log analysis
    Knight E.
    Network Security, 2010, 2010 (10) : 17 - 20
  • [3] Digital Forensics Security Analysis on iOS Devices
    Wu, Min-Hao
    Chang, Ting-Cheng
    Yi Li-Min
    JOURNAL OF WEB ENGINEERING, 2021, 20 (03): : 775 - 793
  • [4] Network Security Approach for Digital Forensics Analysis
    Achi, H.
    Hellany, A.
    Nagrial, M.
    ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
  • [5] Digital image forensics via intrinsic fingerprints
    Swaminathan, Ashwin
    Wu, Min
    Liu, K. J. Ray
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 101 - 117
  • [6] An Ontology for Digital Security and Digital Forensics Investigative Techniques
    Ellison, Dagney
    Venter, Hein
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 119 - 127
  • [7] An ontology for digital security and digital forensics investigative techniques
    University of Pretoria, Pretoria, South Africa
    Proc. Int. Conf. Cyber Warf. Secur., ICCWS, 1600, (119-127):
  • [8] Distributed Log System in Cloud Digital Forensics
    Jiang, Ci-Bin
    Liu, I-Hsien
    Chen, Yi-Chen
    Li, Jung-Shian
    Liu, Chuan-Gang
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 258 - 263
  • [9] Digital Forensics Curriculum in Security Education
    Srinivasan, S.
    JOURNAL OF INFORMATION TECHNOLOGY EDUCATION-INNOVATIONS IN PRACTICE, 2013, 12 : 147 - 157
  • [10] Analysis of firewall log-based detection scenarios for evidence in digital forensics
    Mukhtar, Rabiu
    Al-Nemrat, A.
    Alazab, Mamoun
    Venkatraman, Sitalakshmi
    Jahankhani, Hamid
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 261 - 279