Cyber Security and Digital Forensics最新文献

筛选
英文 中文
Roadmap of Digital Forensics Investigation Process with Discovery of Tools 数字取证调查过程与工具发现的路线图
Cyber Security and Digital Forensics Pub Date : 2022-01-14 DOI: 10.1002/9781119795667.ch11
A. Patil, Soumita Banerjee, D. Jadhav, Gautam Borkar
{"title":"Roadmap of Digital Forensics Investigation Process with Discovery of Tools","authors":"A. Patil, Soumita Banerjee, D. Jadhav, Gautam Borkar","doi":"10.1002/9781119795667.ch11","DOIUrl":"https://doi.org/10.1002/9781119795667.ch11","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications 利用和保护在线应用程序常见恶意输入的最新技术
Cyber Security and Digital Forensics Pub Date : 2022-01-14 DOI: 10.1002/9781119795667.ch15
Tun Myat Aung, Ni Ni Hla
{"title":"Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications","authors":"Tun Myat Aung, Ni Ni Hla","doi":"10.1002/9781119795667.ch15","DOIUrl":"https://doi.org/10.1002/9781119795667.ch15","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114680206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensics as a Service: Analysis for Forensic Knowledge 数字法医学服务:法医学知识分析
Cyber Security and Digital Forensics Pub Date : 2022-01-14 DOI: 10.1002/9781119795667.ch7
Soumita Banerjee, A. Patil, D. Jadhav, Gautam Borkar
{"title":"Digital Forensics as a Service: Analysis for Forensic Knowledge","authors":"Soumita Banerjee, A. Patil, D. Jadhav, Gautam Borkar","doi":"10.1002/9781119795667.ch7","DOIUrl":"https://doi.org/10.1002/9781119795667.ch7","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ensuring Secure Data Sharing in IoT Domains Using Blockchain 使用区块链确保物联网领域的安全数据共享
Cyber Security and Digital Forensics Pub Date : 2022-01-14 DOI: 10.1002/9781119795667.ch9
Tawseef Ahmed Teli, R. Yousuf, D. Khan
{"title":"Ensuring Secure Data Sharing in IoT Domains Using Blockchain","authors":"Tawseef Ahmed Teli, R. Yousuf, D. Khan","doi":"10.1002/9781119795667.ch9","DOIUrl":"https://doi.org/10.1002/9781119795667.ch9","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114739319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework 4S框架:一个实用的CPS设计安全评估和基准框架
Cyber Security and Digital Forensics Pub Date : 2022-01-14 DOI: 10.1002/9781119795667.ch8
Neel Patel, Dhairya A. Parekh, Yash Shah, Ramchandra S. Mangrulkar
{"title":"4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework","authors":"Neel Patel, Dhairya A. Parekh, Yash Shah, Ramchandra S. Mangrulkar","doi":"10.1002/9781119795667.ch8","DOIUrl":"https://doi.org/10.1002/9781119795667.ch8","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121700622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review of Face Analysis Techniques for Conventional and Forensic Applications 人脸分析技术在传统和法医应用中的综述
Cyber Security and Digital Forensics Pub Date : 2022-01-14 DOI: 10.1002/9781119795667.ch10
H. Chethana, Trisiladevi C. Nagavi
{"title":"A Review of Face Analysis Techniques for Conventional and Forensic Applications","authors":"H. Chethana, Trisiladevi C. Nagavi","doi":"10.1002/9781119795667.ch10","DOIUrl":"https://doi.org/10.1002/9781119795667.ch10","url":null,"abstract":"","PeriodicalId":115393,"journal":{"name":"Cyber Security and Digital Forensics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116999232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信