Computer Forensics: Cybercriminals, Laws, and Evidence

被引:0
|
作者
Yu, Szde [1 ]
机构
[1] Wichita State Univ, Wichita, KS 67260 USA
关键词
D O I
10.1177/1057567713476708
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
引用
收藏
页码:103 / 104
页数:3
相关论文
共 50 条
  • [41] Computer forensics: Past, present and future
    Culley, Adrian
    Information Security Technical Report, 2003, 8 (02): : 32 - 36
  • [42] Formalizing Computer Forensics Process with UML
    Ruan, Chun
    Huebner, Ewa
    INFORMATION SYSTEMS: MODELING, DEVELOPMENT, AND INTEGRATION: THIRD INTERNATIONAL UNITED INFORMATION SYSTEMS CONFERENCE, UNISCON 2009, 2009, 20 : 184 - 189
  • [43] Exploratory Study on Computer Forensics Technology
    Hu, Dan
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 608 - 611
  • [44] Emerging paper standards in computer forensics
    Ballou, Susan
    Gilliland, Rhesa G.
    DIGITAL INVESTIGATION, 2011, 8 (02) : 96 - 97
  • [45] Identification of legal issues for computer forensics
    Brungs, A
    Jamieson, R
    INFORMATION SYSTEMS MANAGEMENT, 2005, 22 (02) : 57 - 66
  • [46] Computer Forensics in GSM cell phones
    Cano, Jeimy
    CIENCIA UNEMI, 2008, 1 (01): : 20 - 25
  • [47] The Class of Information Crime and Computer Forensics
    Ling, Tang
    PROCEEDINGS OF THE 2016 INTERNATIONAL SEMINAR ON EDUCATION INNOVATION AND ECONOMIC MANAGEMENT (SEIEM 2016), 2016, 75 : 477 - 480
  • [48] The future implications of computer forensics on VoIP
    Jones, A
    DIGITAL INVESTIGATION, 2005, 2 (03) : 206 - 208
  • [49] Computer Forensics System Based On Honeypot
    Li, Zi Chen
    Li, Xiao Jia
    Gong, Lei
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 336 - 337
  • [50] The Importance of Web Activities for Computer Forensics
    Varol, Asaf
    Sonmez, Yesim Ulgen
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 66 - 71