Tor forensics: Proposed workflow for client memory artefacts

Author:

Alfosail MalakORCID,Norris Peter

Publisher

Elsevier BV

Subject

Law,General Computer Science

Reference21 articles.

1. Using the Parkerian Hexad to introduce security in an information literacy class.;Reid,2010

2. Jacopy, C. Chow, M. (2016). The onion router and the Darkweb. [Online]. Retrieved from https://www.cs.tufts.edu/comp/116/archive/fall2016/cjacoby.pdf (Accessed 12. Dec)

3. Ceysun, S., Murdoch, S, and Muffett, A. (2015). “Tor: hidden service scaling”. [Online] Retrieved from: https://www.benthamsgaze.org/wp-content/uploads/2015/11/sucu-torscaling.pdf (Accessed 12. Dec)

4. The TOR data communication system: a survey;Ramzi,2014

5. How do Tor users interact with onion services?;Winter,2018

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems;Information;2024-08-19

2. Decrypting IndexedDB in private mode of Gecko-based browsers;Forensic Science International: Digital Investigation;2024-07

3. Chracer: Memory analysis of Chromium-based browsers;Forensic Science International: Digital Investigation;2023-10

4. Extending Tor to Achieve Recipient Anonymity;2023

5. On the Digital Forensics of Social Networking Web-based Applications;2022 10th International Symposium on Digital Forensics and Security (ISDFS);2022-06-06

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3