{"title":"客户端和服务器端的私有Seafile云存储中的数字取证","authors":"Asgarali Bouyer, Mojtaba Zirak","doi":"10.1504/ijesdf.2021.10031878","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"42 1","pages":"233-267"},"PeriodicalIF":0.4000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Digital forensics in private Seafile cloud storage from both client and server side\",\"authors\":\"Asgarali Bouyer, Mojtaba Zirak\",\"doi\":\"10.1504/ijesdf.2021.10031878\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":54070,\"journal\":{\"name\":\"International Journal of Electronic Security and Digital Forensics\",\"volume\":\"42 1\",\"pages\":\"233-267\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Electronic Security and Digital Forensics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijesdf.2021.10031878\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electronic Security and Digital Forensics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijesdf.2021.10031878","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
期刊介绍:
IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security related issues, new developments and latest proven methodologies in the field of electronic security and digital forensics. This includes the measures governments must take to protect the security of information on the Internet, the implications of cyber-crime in large corporations and individuals, vulnerability research, zero day attacks, digital forensic investigation, ethical hacking, anti-forensics, identity fraud, phishing, pharming, and relevant case studies and “best practice" on tackling cyber crime.