Subject
Law,Medical Laboratory Technology,Computer Science Applications,Information Systems,Pathology and Forensic Medicine
Reference70 articles.
1. Strategically-motivated advanced persistent threat: definition, process, tactics and a disinformation model of counterattack;Ahmad;Comput. Secur.,2019
2. A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities;Alshamrani;IEEE Commun. Surv. Tutorials,2019
3. Analyse digital forensic evidences through a semantic-based methodology and nlp techniques;Amato;Future Generat. Comput. Syst.,2019
4. A semi-automated forensic investigation model for online social networks;Arshad;Comput. Secur.,2020
5. Tracking the bad guys: an efficient forensic methodology to trace multi-step attacks using core attack graphs;Barrère,2017
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital Twins in Industry 4.0 Cyber Security;2023 IEEE Smart World Congress (SWC);2023-08-28
2. Internet of Things and Digital Forensics: Recent Studies and Challenges;2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS);2023-06-14