ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Volatile Memory Forensics: A Legal Perspective
International Journal of Computer Applications
◽
10.5120/ijca2016912276
◽
2016
◽
Vol 155
(3)
◽
pp. 11-15
Author(s):
Harnoor Kaur
◽
Gurpal Singh
Keyword(s):
Memory Forensics
◽
Legal Perspective
◽
Volatile Memory
Download Full-text
Related Documents
Cited By
References
Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks
International Journal of Information Technology
◽
10.1007/s41870-018-0263-4
◽
2018
◽
Vol 11
(3)
◽
pp. 583-589
◽
Cited By ~ 2
Author(s):
Nilay R. Mistry
◽
M. S. Dahiya
Keyword(s):
Cyber Attacks
◽
Memory Forensics
◽
Volatile Memory
Download Full-text
Windows Volatile Memory Forensics Based on Correlation Analysis
Journal of Networks
◽
10.4304/jnw.9.3.645-652
◽
2014
◽
Vol 9
(3)
◽
Author(s):
Xiaolu Zhang
◽
Liang Hu
◽
Shinan Song
◽
Zhenzhen Xie
◽
Xiangyu Meng
◽
...
Keyword(s):
Correlation Analysis
◽
Memory Forensics
◽
Volatile Memory
Download Full-text
Volatile Memory Forensics Of Privacy Aware Operating Systems
International Journal of Electronic Security and Digital Forensics
◽
10.1504/ijesdf.2021.10036492
◽
2021
◽
Vol 1
(1)
◽
pp. 1
Author(s):
S.O. Junare
◽
Sampada Kanitkar
◽
Nilay Mistry
Keyword(s):
Operating Systems
◽
Memory Forensics
◽
Volatile Memory
Download Full-text
Volatile Memory Forensics Acquisition Efficacy
Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018
◽
10.1145/3230833.3232810
◽
2018
◽
Author(s):
Jacob Taylor
◽
Benjamin Turnbull
◽
Gideon Creech
Keyword(s):
Memory Forensics
◽
Volatile Memory
Download Full-text
Email spoofing detection using volatile memory forensics
2017 IEEE Conference on Communications and Network Security (CNS)
◽
10.1109/cns.2017.8228692
◽
2017
◽
Cited By ~ 1
Author(s):
R. Padmavathi Iyer
◽
Pradeep K. Atrey
◽
Gaurav Varshney
◽
Manoj Misra
Keyword(s):
Memory Forensics
◽
Spoofing Detection
◽
Volatile Memory
Download Full-text
Volatile memory forensics of privacy-aware operating systems
International Journal of Electronic Security and Digital Forensics
◽
10.1504/ijesdf.2021.118548
◽
2021
◽
Vol 13
(6)
◽
pp. 671
Author(s):
Nilay R. Mistry
◽
Sampada Kanitkar
◽
S.O. Junare
Keyword(s):
Operating Systems
◽
Memory Forensics
◽
Volatile Memory
Download Full-text
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging
2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
◽
10.1109/passat/socialcom.2011.68
◽
2011
◽
Cited By ~ 7
Author(s):
Amer Aljaedi
◽
Dale Lindskog
◽
Pavol Zavarsky
◽
Ron Ruhl
◽
Fares Almari
Keyword(s):
Comparative Analysis
◽
Memory Forensics
◽
Volatile Memory
Download Full-text
Memory forensics tools: Comparing processing time and left artifacts on volatile memory
2016 International Workshop on Computational Intelligence (IWCI)
◽
10.1109/iwci.2016.7860344
◽
2016
◽
Cited By ~ 1
Author(s):
Khaleque Md Aashiq Kamal
◽
Mahmoud Alfadel
◽
Munawara Saiyara Munia
Keyword(s):
Processing Time
◽
Memory Forensics
◽
Volatile Memory
Download Full-text
Private Data Acquisition Method Based on System-Level Data Migration and Volatile Memory Forensics for Android Applications
IEEE Access
◽
10.1109/access.2019.2894643
◽
2019
◽
Vol 7
◽
pp. 16695-16703
◽
Cited By ~ 1
Author(s):
Peijun Feng
◽
Qingbao Li
◽
Ping Zhang
◽
Zhifeng Chen
Keyword(s):
Data Acquisition
◽
Data Migration
◽
System Level
◽
Memory Forensics
◽
Private Data
◽
Level Data
◽
Android Applications
◽
Volatile Memory
◽
Acquisition Method
Download Full-text
Process based volatile memory forensics for ransomware detection
Concurrency and Computation Practice and Experience
◽
10.1002/cpe.6672
◽
2021
◽
Author(s):
Asad Arfeen
◽
Muhammad Asim Khan
◽
Obad Zafar
◽
Usama Ahsan
Keyword(s):
Memory Forensics
◽
Volatile Memory
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close