2022
DOI: 10.3390/forensicsci2010007
|View full text |Cite
|
Sign up to set email alerts
|

A Digital Forensic View of Windows 10 Notifications

Abstract: Windows Push Notifications (WPN) is a relevant part of Windows 10 interaction with the user. It is comprised of badges, tiles and toasts. Important and meaningful data can be conveyed by notifications, namely by so-called toasts that can popup with information regarding a new incoming email or a recent message from a social network. In this paper, we analyze the Windows 10 Notification systems from a digital forensic perspective, focusing on the main forensic artifacts conveyed by WPN. We also briefly analyze … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
0
0
Order By: Relevance
“…By utilizing the deliverables identity-based broadcast encryption system, the KP-ABE approach creates a constant cypher text size. This makes it possible to express the access strategy with any form of repetitive access structure [10]. The amount of bilinear pairing is regarded as constant while cypher text size is self-governing to the number of cypher text attributes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…By utilizing the deliverables identity-based broadcast encryption system, the KP-ABE approach creates a constant cypher text size. This makes it possible to express the access strategy with any form of repetitive access structure [10]. The amount of bilinear pairing is regarded as constant while cypher text size is self-governing to the number of cypher text attributes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Some cloud service providers such as OneDrive, Azure, Google Drive, Alibaba, and IBM Cloud are well-known cloud storage applications that offer a variety of security options to protect user's data as well as user privacy [20]. OneDrive may be given high priority [21]. After OneDrive, the use of Google Drive should be considered a high priority if there is a possibility that an issue would arise regarding the safety of any reputable organization's email communications.…”
Section: B Cloud Storage Application Providersmentioning
confidence: 99%