Author:
Thomas Tyler,Piscitelli Mathew,Shavrov Ilya,Baggili Ibrahim
Funder
National Science Foundation
Reference46 articles.
1. Memory forensics methodology for investigating cryptocurrency protocols;Ali,2018
2. Linux memory forensics: dissecting the user space process heap;Block;Digit. Invest.,2017
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINTs (ConPoint);Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. On enhancing memory forensics with FAME: Framework for advanced monitoring and execution;Forensic Science International: Digital Investigation;2024-07
3. Recovery CAT: A Digital Forensics Tool for Cryptocurrency Investigations;2024 12th International Symposium on Digital Forensics and Security (ISDFS);2024-04-29
4. A review of research in forensic investigation of cryptocurrencies;International Journal of Electronic Security and Digital Forensics;2024
5. Memory Forensics for Artefacts Recovery from Ether Transactions;Lecture Notes in Electrical Engineering;2023-11-02