2022
DOI: 10.1016/j.matpr.2021.05.270
|View full text |Cite
|
Sign up to set email alerts
|

Memory forensic: Acquisition and analysis mechanism for operating systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Moreover, the second comparison is with [24] , a fast and complex model with medium accuracy compared to the proposed model. Furthermore, the third work was authored by [14] in which the speed of the model was not mentioned, but what is noteworthy in this work is the very high accuracy that is comparable to the accuracy of the proposed work and a similar level to the proposed method in terms of complexity. Ultimately, the fourth and last comparison is with [28] , which is medium in both speed and complexity while characterized by relatively high accuracy but still less accurate than the proposed model.…”
Section: Comparing the Proposed Model With Relevant Studiesmentioning
confidence: 74%
See 1 more Smart Citation
“…Moreover, the second comparison is with [24] , a fast and complex model with medium accuracy compared to the proposed model. Furthermore, the third work was authored by [14] in which the speed of the model was not mentioned, but what is noteworthy in this work is the very high accuracy that is comparable to the accuracy of the proposed work and a similar level to the proposed method in terms of complexity. Ultimately, the fourth and last comparison is with [28] , which is medium in both speed and complexity while characterized by relatively high accuracy but still less accurate than the proposed model.…”
Section: Comparing the Proposed Model With Relevant Studiesmentioning
confidence: 74%
“…Memory analysis that isn't done in realtime necessitates snapshots, and taking these snapshots is critical to ensuring that memory files aren't harmed. The memory analysis process could be changed by affected memory files, eliminating the analysis's reliability [14] .…”
Section: Related Workmentioning
confidence: 99%
“…The executor was able to reach the target machine because of the file. The practice of examining the volatile memory (RAM) of a device to find digital evidence for the investigation of a cybercrime or security incident is known as memory forensic analysis [30]. The analysis must be performed while the device is still operational because volatile memory (RAM) is used to store data that is lost when it is turned off.…”
Section: Figure 10 Hard Drive Storage Investigation F) Memory Forensicmentioning
confidence: 99%
“…Cybercrime activities in mobile telephones have expanded exponentially as they are utilized in many daily tasks, such as personal and business data storage and transfer, and in Internet-based communications [1]- [3]. With an alarming 188% increase in Windows Phone vulnerabilities and a 262% increase in iOS vulnerabilities, mobile devices have become one of the most prevalent weaknesses, increasing more than three times faster than other threats [4], [5]. Forensic investigation of mobile devices is especially difficult owing to the considerable evidence and technological levels.…”
Section: Introductionmentioning
confidence: 99%