共 50 条
- [21] Volatile data vs. data at rest: the requirements of digital forensics Netw. Secur., 2008, 6 (13-15):
- [22] Detection of Anti-forensics and Malware Applications in Volatile Memory Acquisition ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND PRACTICES IN ARTIFICIAL INTELLIGENCE, 2022, 13343 : 516 - 527
- [23] Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics 2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2018, : 589 - 594
- [24] Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering 2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021,
- [26] Framework for Live Forensics of a System by Extraction of Clipboard Data and Other Forensic Artefacts from RAM Image SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 473 - 482
- [28] Investigating the hooking behavior: A page-level memory monitoring method for live forensics Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8783 : 255 - 272
- [29] Digital Forensics Random Access Memory Using Live Technique Based On Network Attacked 2017 5TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOIC7), 2017,
- [30] Module extraction and DLL hijacking detection via single or multiple memory dumps FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 44