Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Digital Forensics and Cyber Crime Datamining"
written by K. K. Sindhu, B. B. Meshram,
published by Journal of Information Security, Vol.3 No.3, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics
… of the Association for Information Systems, 2022
[2] Research Perspective on Digital Forensic Tools and Investigation Process
Illumination of Artificial Intelligence in …, 2022
[3] Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad
Terrorism and Political Violence, 2022
[4] Digital Forensic Investigation Framework for Marine Industry
2022 International Wireless …, 2022
[5] A Digital Forensics Approach for Lost Secondary Partition Analysis using Master Boot Record Structured Hard Disk Drives
… University Journal of …, 2021
[6] Cyber Forensics Tools: A Review on Mechanism and Emerging Challenges
2021
[7] Computer Forensics and Cyber Crime Handling
2020
[8] 不正アクセスの痕跡情報を用いたタイムライン型イベントログ可視化機能の開発
2020
[9] Process mining-based approach for investigating malicious login events
2020
[10] Comprehensive Review of Cybercrime Detection Techniques
2020
[11] Digital Forensics: Crimes and Challenges in Online Social Networks Forensics
2020
[12] First response: Computer Forensics
2020
[13] Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework
International Journal of Advanced Computer Science and Applications, 2020
[14] Ontology for reactive techniques in digital forensics
2019
[15] A Digital Forensic Readiness Approach for Ransomware Forensics
2019
[16] Malware Forensic Analytics Framework Using Big Data Platform
2019
[17] Vulnerabilities & Attacks in SRS for Object-Oriented Software Development
2019
[18] Practicality of Data Mining for Proficient Network Security Management
2018
[19] 利用信息网络犯罪行为二元形态的教义解读 The Interpretation of the Doctrine of Binary Form of Information Network Crime
2018
[20] Acquisition of Blackberry Messenger's Digital Evidence in Android Based Smartphone
2018
[21] Cyber Dogfighting: A Case Study Evaluation of the Dynamic Decision-Making Used by Hackers in a Turbulent Environment of Cyberspace at a Regional Hacking …
2018
[22] A Review of Evidence Extraction Techniques in Big Data Environment
2018
[23] Survey of Analysis of Crime Detection Techniques Using Data Mining and Machine Learning
Journal of Physics: Conference Series, 2018
[24] Web application attack detection and forensics: A survey
2018
[25] Forensic science, electronic evidence and cybercrime prosecution in Nigeria
2018
[26] Analysis of Crime data using data mining
International Journal of Engineering, Science and Mathematics, 2017
[27] Forensik Jaringan untuk Deteksi Serangan Flooding pada Web Server
2017
[28] A Quantitative Analysis of Organizational Factors that Relate to Data Mining Success
ProQuest Dissertations Publishing, 2017
[29] Network Forensics For Detecting Flooding Attack On Web Server
International Journal of Computer Science and Information Security, 2017
[30] Database Forensic Menggunakan Log File Untuk Deteksi Penyalahgunaan Hak Akses User
2017
[31] Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies
International Journal of Information Security and Privacy (IJISP), 2017
[32] Data Mining Analytics for Crime Security Investigation and Intrusion Detection
2016
[33] A Classification Framework for Data Mining Applications in Criminal Science and Investigations
2016
[34] Data Mining Techniques to Facilitate Digital Forensics Investigations
Advances in Computer Science and Ubiquitous Computing, 2016
[35] Digital Forensic a Novel Way to Investigate E-Crime
International Journal of New Innovations in Engineering and Technology, 2016
[36] Scenario-Based Digital Forensics Challenges in Cloud Computing
Symmetry, 2016
[37] 基于协议验证的时间自动机取证模型
南京邮电大学学报:自然科学版, 2016
[38] Data analysis of file forensic investigation
2016
[39] The perception of cyber threats and its associative relationship to the protection motivation theory and generational age groups: A quantitative study
ProQuest Dissertations Publishing, 2015
[40] Predictive modeling of complex cyberthreats with formal concept analysis
2015
[41] Comparative Study and Simulation of Digital Forensic Tools
International Journal of Computer Applications, 2015
[42] 网络动态数据挖掘研究进展与展望
图书情报工作, 2015
[43] Building adaptive defense against cybercrimes using real-time data mining
Anti-Cybercrime (ICACC), 2015 First International Conference on, 2015
[44] A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes
Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing. ACM, 2014
[45] A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining
International Journal of Advances in Computer Science and Technology, 2014
[46] Digital Forensics 2.0
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Springer International Publishing, 2014
[47] A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management
2014
[48] Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics
Journal of ICT Research and Applications, 2014
[49] Proposals to Win the Battle Against Cyber Crime
2014
[50] A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident …
2014
[51] Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics.
2014
[52] Digital Forensic: An Annalistic Challenge
Proceeding, National Conference on Advances in Computing & Networking (NCAICN), 2013
[53] The Future of Internet Systems Security
2013
[54] Forensic Investigative Methodologies for Digital Crime
International Journal of Computer Science & Applications (TIJCSA), 2013
[55] " First response: Computer Forensics" By Dr. Vinod Surana
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top