2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) 2016
DOI: 10.1109/wispnet.2016.7566345
|View full text |Cite
|
Sign up to set email alerts
|

Forensic model for cloud computing: An overview

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 19 publications
0
0
0
Order By: Relevance
“…The purpose of this paper is to emphasize the difficulties that investigators face during the investigation process. The paper highlights that for forensic investigation, it is difficult to find who uses cloud resources for unauthorized purposes [5].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The purpose of this paper is to emphasize the difficulties that investigators face during the investigation process. The paper highlights that for forensic investigation, it is difficult to find who uses cloud resources for unauthorized purposes [5].…”
Section: Literature Reviewmentioning
confidence: 99%