"Digital Forensics and Cyber Crime Datamining"
written by K. K. Sindhu, B. B. Meshram,
published by Journal of Information Security, Vol.3 No.3, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Malware Forensic Analytics Framework Using Big Data Platform
2019
[2] 利用信息网络犯罪行为二元形态的教义解读 The Interpretation of the Doctrine of Binary Form of Information Network Crime
2018
[3] Acquisition of Blackberry Messenger's Digital Evidence in Android Based Smartphone
2018
[4] Cyber Dogfighting: A Case Study Evaluation of the Dynamic Decision-Making Used by Hackers in a Turbulent Environment of Cyberspace at a Regional Hacking …
2018
[5] A Review of Evidence Extraction Techniques in Big Data Environment
2018
[6] Survey of Analysis of Crime Detection Techniques Using Data Mining and Machine Learning
Journal of Physics: Conference Series, 2018
[7] Web application attack detection and forensics: A survey
2018
[8] A Quantitative Analysis of Organizational Factors that Relate to Data Mining Success
ProQuest Dissertations Publishing, 2017
[9] Network Forensics For Detecting Flooding Attack On Web Server
International Journal of Computer Science and Information Security, 2017
[10] Database Forensic Menggunakan Log File Untuk Deteksi Penyalahgunaan Hak Akses User
2017
[11] Analysis of Crime data using data mining
International Journal of Engineering, Science and Mathematics, 2017
[12] Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies
International Journal of Information Security and Privacy (IJISP), 2017
[13] Data Mining Analytics for Crime Security Investigation and Intrusion Detection
2016
[14] A Classification Framework for Data Mining Applications in Criminal Science and Investigations
2016
[15] Data Mining Techniques to Facilitate Digital Forensics Investigations
Advances in Computer Science and Ubiquitous Computing, 2016
[16] Digital Forensic a Novel Way to Investigate E-Crime
International Journal of New Innovations in Engineering and Technology, 2016
[17] Scenario-Based Digital Forensics Challenges in Cloud Computing
Symmetry, 2016
[18] 基于协议验证的时间自动机取证模型
南京邮电大学学报:自然科学版, 2016
[19] Data analysis of file forensic investigation
2016
[20] The perception of cyber threats and its associative relationship to the protection motivation theory and generational age groups: A quantitative study
ProQuest Dissertations Publishing, 2015
[21] Comparative Study and Simulation of Digital Forensic Tools
International Journal of Computer Applications, 2015
[22] 网络动态数据挖掘研究进展与展望
图书情报工作, 2015
[23] Building adaptive defense against cybercrimes using real-time data mining
Anti-Cybercrime (ICACC), 2015 First International Conference on, 2015
[24] A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes
Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing. ACM, 2014
[25] A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining
International Journal of Advances in Computer Science and Technology, 2014
[26] Digital Forensics 2.0
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Springer International Publishing, 2014
[27] A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management
2014
[28] Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics
Journal of ICT Research and Applications, 2014
[29] Proposals to Win the Battle Against Cyber Crime
2014
[30] Digital Forensic: An Annalistic Challenge
Proceeding, National Conference on Advances in Computing & Networking (NCAICN), 2013
[31] The Future of Internet Systems Security
2013
[32] Forensic Investigative Methodologies for Digital Crime
International Journal of Computer Science & Applications (TIJCSA), 2013