2016 Symposium on Colossal Data Analysis and Networking (CDAN) 2016
DOI: 10.1109/cdan.2016.7570957
|View full text |Cite
|
Sign up to set email alerts
|

Recovering deleted browsing artifacts from web browser log files in Linux environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…These files can easily be obtained by anyone who has access to the same machine. Even if the user uses some third-party PC cleaning tools to wipe out the browser data, the files can still be accessed from computer forensic tools [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These files can easily be obtained by anyone who has access to the same machine. Even if the user uses some third-party PC cleaning tools to wipe out the browser data, the files can still be accessed from computer forensic tools [2].…”
Section: Introductionmentioning
confidence: 99%
“…Encryption includes generating a random symmetric key and running encryption with a keyword in access policy string [10]. Access control and encryption secure the data on disk drives [2]. Available encryption modes include cipher block chaining, various counter modes with location-dependent IV, location-tweaked electronic codebook or wide-block encryption.…”
Section: Introductionmentioning
confidence: 99%
“…Data deleted is recoverable but if erased properly is permanently removed [23]. In some cases [24], it is possible to recover almost all deleted browsing activity. PII can be held on any device that has permanent memory like desktop, printer, laptop, external hard drives, etc., so deciding whether to overwrite or destroy will depend on whether the organisation will use the device again [10].…”
mentioning
confidence: 99%
“…Data deleted is recoverable but if erased properly is permanent [23]. In some cases [24], it is possible to recover almost all deleted browsing activity. PII can be held on any device that has permanent memory like desktop, printer, laptop, external hard drives etc., so deciding whether to overwrite or destroy will depend on whether the organisation will use the device again [10].…”
mentioning
confidence: 99%