"Digital Forensics and Cyber Crime Datamining"
written by K. K. Sindhu, B. B. Meshram,
published by Journal of Information Security, Vol.3 No.3, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Digital Forensics: Crimes and Challenges in Online Social Networks Forensics
[2] Comprehensive Review of Cybercrime Detection Techniques
[3] Process mining-based approach for investigating malicious login events
[4] Vulnerabilities & Attacks in SRS for Object-Oriented Software Development
[5] Malware Forensic Analytics Framework Using Big Data Platform
[6] A Digital Forensic Readiness Approach for Ransomware Forensics
[7] Web application attack detection and forensics: A survey
[8] Survey of Analysis of Crime Detection Techniques Using Data Mining and Machine Learning
Journal of Physics: Conference Series, 2018
[9] A Review of Evidence Extraction Techniques in Big Data Environment
[10] Cyber Dogfighting: A Case Study Evaluation of the Dynamic Decision-Making Used by Hackers in a Turbulent Environment of Cyberspace at a Regional Hacking …
[11] Acquisition of Blackberry Messenger's Digital Evidence in Android Based Smartphone
[12] 利用信息网络犯罪行为二元形态的教义解读 The Interpretation of the Doctrine of Binary Form of Information Network Crime
[13] Practicality of Data Mining for Proficient Network Security Management
[14] Database Forensic Menggunakan Log File Untuk Deteksi Penyalahgunaan Hak Akses User
[15] Analysis of Crime data using data mining
International Journal of Engineering, Science and Mathematics, 2017
[16] A Quantitative Analysis of Organizational Factors that Relate to Data Mining Success
ProQuest Dissertations Publishing, 2017
[17] Network Forensics For Detecting Flooding Attack On Web Server
International Journal of Computer Science and Information Security, 2017
[18] Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies
International Journal of Information Security and Privacy (IJISP), 2017
[19] A Classification Framework for Data Mining Applications in Criminal Science and Investigations
[20] Data Mining Analytics for Crime Security Investigation and Intrusion Detection
[21] Scenario-Based Digital Forensics Challenges in Cloud Computing
Symmetry, 2016
[22] Digital Forensic a Novel Way to Investigate E-Crime
International Journal of New Innovations in Engineering and Technology, 2016
[23] 基于协议验证的时间自动机取证模型
南京邮电大学学报:自然科学版, 2016
[24] Data analysis of file forensic investigation
[25] Data Mining Techniques to Facilitate Digital Forensics Investigations
Advances in Computer Science and Ubiquitous Computing, 2016
[26] The perception of cyber threats and its associative relationship to the protection motivation theory and generational age groups: A quantitative study
ProQuest Dissertations Publishing, 2015
[27] Predictive modeling of complex cyberthreats with formal concept analysis
[28] Comparative Study and Simulation of Digital Forensic Tools
International Journal of Computer Applications, 2015
[29] Building adaptive defense against cybercrimes using real-time data mining
Anti-Cybercrime (ICACC), 2015 First International Conference on, 2015
[30] 网络动态数据挖掘研究进展与展望
图书情报工作, 2015
[31] Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics
Journal of ICT Research and Applications, 2014
[32] A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management
[33] Digital Forensics 2.0
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Springer International Publishing, 2014
[34] A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining
International Journal of Advances in Computer Science and Technology, 2014
[35] A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes
Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing. ACM, 2014
[36] Proposals to Win the Battle Against Cyber Crime
[37] Forensic Investigative Methodologies for Digital Crime
International Journal of Computer Science & Applications (TIJCSA), 2013
[38] The Future of Internet Systems Security
[39] Digital Forensic: An Annalistic Challenge
Proceeding, National Conference on Advances in Computing & Networking (NCAICN), 2013
[40] Forensic science, electronic evidence and cybercrime prosecution in Nigeria