Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 15 publications
0
15
0
1
Order By: Relevance
“…Data hiding [14] claims, hide data so unreadable using techniques such as encryption, steganography, and others.…”
Section:  Data Hidingmentioning
confidence: 99%
“…Data hiding [14] claims, hide data so unreadable using techniques such as encryption, steganography, and others.…”
Section:  Data Hidingmentioning
confidence: 99%
“…Whenever there is an attack on a network, there is always a need to provide evidence which is conform to forensics investigation standard. This allow to infer that the attack has really happened and to be able to identify the source of the attack so that it could be used against the suspect in the law court [19].…”
Section: Session Hijackingmentioning
confidence: 99%
“…The gathered information should be documented using techniques such as OpenSVN subversion (Fairbanks et al, 2007;Rekhis & Boudriga, 2012 The integrity of the evidence becomes a questionable factor in evidence collection process. Identification of occurrence of anti-forensic techniques in attacks is another major concern for forensic investigators.…”
Section: Phase 2: Network Forensics and Analysismentioning
confidence: 99%
“…Leaving no trace of the anti-forensic tool or technique deployed (Rekhis & Boudriga, 2012). In order to achieve these goals, there are various tools and techniques are introduced (Caloyannides, 2009;Cao, Zhao, Ni, & Tian, 2010;Forte & Power, 2007;Harris, 2006;Rekhis & Boudriga, 2010b;Sartin, 2006;Shanmugam et al, 2011).…”
Section: Fundamentals Of Anti-forensic Techniquesmentioning
confidence: 99%