Advanced search

Found 2 swedish dissertations matching the above criteria.

  1. 1. Advancing Automation in Digital Forensic Investigations

    Author : Irvin Homem; Panagiotis Papapetrou; Fredrik Blix; Indre Žliobaitė; Stockholms universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Digital Forensics; Machine Learning; Computer Forensics; Network Forensics; Predictive Modelling; Distributed Systems; Mobile Devices; Mobile Forensics; Memory Forensics; Android; Semantic Web; Hypervisors; Virtualization; Remote Acquisition; Evidence Analysis; Correlation; P2P; Bittorrent; Computer and Systems Sciences; data- och systemvetenskap;

    Abstract : Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. READ MORE

  2. 2. Towards Automation in Digital Investigations : Seeking Efficiency in Digital Forensics in Mobile and Cloud Environments

    Author : Irvin Homem; Theo Kanter; Panagiotis Papapetrou; Rahim Rahmani; Fredrik Björck; Stockholms universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer forensics; network forensics; mobile devices; mobile forensics; cloud computing; semantic web; hypervisors; virtualization; remote acquisition; automation; evidence analysis; correlation; P2P; bittorrent; datalogi; Computer Science; informationssäkerhet; Information Systems Security;

    Abstract : Cybercrime and related malicious activity in our increasingly digital world has become more prevalent and sophisticated, evading traditional security mechanisms. Digital forensics has been proposed to help investigate, understand and eventually mitigate such attacks. READ MORE