共 40 条
[1]
Goel N., Ganotra D., An approach for anti-forensic contrast enhancement detection using grey level co-occurrence matrix and Zernike moments, Int J Inf Tecnol, 15, pp. 1625-1636, (2023)
[2]
Surange G., Khatri P., Integrated intelligent IOT forensic framework for data acquisition through open-source tools, Int J Inf Tecnol, 14, pp. 3011-3018, (2022)
[3]
Ramazhamba P.T., Venter H.S., Using distributed ledger technology for digital forensic investigation purposes on tendering projects, Int J Inf Tecnol, 15, pp. 1255-1274, (2023)
[4]
Choudhary A.K., Rahamatkar S., Purbey S., DQNANFCT: design of a deep Q-learning network for augmented network forensics via integrated contextual trust operations, Int J Inf Tecnol, 15, pp. 2729-2739, (2023)
[5]
Sharma P., Nagpal B., Regex: an experimental approach for searching in cyber forensics, Int J Inf Tecnol, 12, pp. 339-343, (2020)
[6]
Patil R.Y., Patil Y.H., Bannore A., Et al., Ensuring accountability in digital forensics with proxy re-encryption based chain of custody, Int J Inf Tecnol, 16, pp. 1841-1853, (2024)
[7]
Nelson R., Shukla A., Smith C., Web browser forensics in google chrome, mozilla firefox, and the tor browser bundle, Digital Forensic Education., 61, (2020)
[8]
Javed A.R., Et al., A comprehensive survey on computer forensics: state-of-the-art, tools, techniques, challenges, and future directions, IEEE Access, 10, pp. 11065-11089, (2022)
[9]
Chiramdasu R., Srivastava G., Bhattacharya S., Reddy P.K., Gadekallu T.R., Malicious URL detection using logistic regression, IEEE International Conference on Omni-Layer Intelligent Systems (COINS), pp. 1-6, (2021)
[10]
Chen Y.-H., Chen J.-L., Ai@ntiphish—machine learning mechanisms for cyber-phishing attack, IEICE Trans Inf Syst, 102, 5, pp. 878-887, (2019)