Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Keywords: Digital forensics
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (3): 304–315.
Published: 09 February 2023
... are encouraged to test other demographics. Originality/value This paper’s contribution is the novel exploration of attitudes and behaviours regarding the combination of privacy, digital forensics, mobile phones and crime reportage. This research effort examined the problematic situation that can arise...
Journal Articles
Actionable threat intelligence for digital forensics readiness
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (2): 273–291.
Published: 11 February 2019
...Nikolaos Serketzis; Vasilios Katos; Christos Ilioudis; Dimitrios Baltatzis; George J. Pangalos Purpose The purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of cyber threat...
Journal Articles
Forensic triage of email network narratives through visualisation
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2014) 22 (4): 358–370.
Published: 07 October 2014
... and potential sources of further evidence. Practical implications – The implications are for digital forensics examiners or for security investigations that involve email data. The approach posited in this paper demonstrates the triage and visualisation of email network narratives to aid an investigation...
Journal Articles
An evaluation of a secure and trustworthy mobile agent‐based e‐marketplace system
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (2): 123–146.
Published: 01 June 2012
..., audit and digital forensic techniques appear as major side issues (Antoniou et al., 2008 ; Katos and Patel, 2008). These techniques are becoming very important because of the business trading auditing legal requirements and the rapid rise of cyber‐crime activities on the internet. While...
