向外 发表于 2025-3-28 15:16:48
Digital Forensic Readiness Framework for Ransomware Investigation threat being malicious software (malware). Ransomware, a variant of malware which encrypts files and retains the decryption key for ransom, has recently proven to become a global digital epidemic. The current method of mitigation and propagation of malware and its variants, such as anti-viruses, ha抵押贷款 发表于 2025-3-28 19:53:49
Forensics Analysis of an On-line Game over Steam Platformls instead of traditional channels like WhatsApp or Facebook. In this paper, we describe a methodology developed after conducting an in-depth digital forensic analysis of the central artifacts of a popular video-game - Counter Strike Nexon Zombies video-game (Steam platform) - where valuable artifac单片眼镜 发表于 2025-3-29 00:54:36
http://reply.papertrans.cn/28/2794/279319/279319_43.png沉默 发表于 2025-3-29 05:53:01
http://reply.papertrans.cn/28/2794/279319/279319_44.png喊叫 发表于 2025-3-29 11:16:48
http://reply.papertrans.cn/28/2794/279319/279319_45.png无表情 发表于 2025-3-29 11:23:45
Digital Forensics Event Graph Reconstructiona forensics investigator needs to process in order to understand the sequence of events that happened on a system. However, ontology processing suffers from large disk consumption and a high computational cost. This paper presents Property Graph Event Reconstruction (PGER), a data normalization andNeedlework 发表于 2025-3-29 15:33:06
Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attackshis paper, we propose a self-adaptive authentication mechanism, ., which is designed to mitigate offline password-guessing attacks. For example, “11th July 2018, Nanjing, China, San Antonio, Texas, research” is a multi-item passphrase. It dynamically monitors items and identifies frequently used ite灯泡 发表于 2025-3-29 21:51:47
http://reply.papertrans.cn/28/2794/279319/279319_48.png伟大 发表于 2025-3-30 01:17:40
http://reply.papertrans.cn/28/2794/279319/279319_49.png