Computer Forensics: Cybercriminals, Laws, and Evidence

被引:0
|
作者
Yu, Szde [1 ]
机构
[1] Wichita State Univ, Wichita, KS 67260 USA
关键词
D O I
10.1177/1057567713476708
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
引用
收藏
页码:103 / 104
页数:3
相关论文
共 50 条
  • [1] Computer Forensics: Cybercriminals, Laws, and Evidence
    Yu, Szde
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2013, 5 (02) : 63 - 66
  • [2] WhatsApp Network Forensics: Discovering the Communication Payloads behind Cybercriminals
    Tsai, Fu-Ching
    Chang, En-Cih
    Kao, Da-Yu
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 679 - 684
  • [3] Computer Forensics Model Based on Evidence Ring and Evidence Chain
    Ma, Guofu
    Wang, Zixian
    Zou, Likun
    Zhang, Qian
    CEIS 2011, 2011, 15
  • [4] The Development of Computer Forensics Education and Digital Evidence Study
    Tang, Ling
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 1301 - 1308
  • [5] Multimedia Forensics Is Not Computer Forensics
    Boehme, Rainer
    Freiling, Felix C.
    Gloe, Thomas
    Kirchner, Matthias
    COMPUTATIONAL FORENSICS, PROCEEDINGS, 2009, 5718 : 90 - +
  • [6] Challenges of Cryptocurrencies Forensics - A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals
    Naqvi, S.
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [7] Computer forensics
    Allen, WH
    IEEE SECURITY & PRIVACY, 2005, 3 (04) : 59 - 62
  • [8] Computer forensics and examination of digital evidence on windows operating system
    Onel, Bunyamin
    Irmak, Erdal
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2021, 24 (03): : 1187 - 1196
  • [9] Computer forensics and culture
    Lin, Yi-Chi
    Slay, Jill
    Lin, I. -Long
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 288 - +
  • [10] Advances in Computer Forensics
    Abdullah, Mohd Taufik
    Mahmod, Ramlan
    Ab Ghani, Abdul Azim
    Abdullah, Mohd Zain
    Sultan, Abu Bakar Md
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 215 - 219