2016 International Conference on Recent Trends in Information Technology (ICRTIT) 2016
DOI: 10.1109/icrtit.2016.7569516
|View full text |Cite
|
Sign up to set email alerts
|

Digital forensic evidence collection of cloud storage data for investigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Also, different data classification plans are assessed while training and testing of the model using the space related data. By assessing the classification precisions of time related and space related models, impact of time related links between observations are investigated [8].As deep learning is ruling the data technology, it doesn't fail to contribute its effectiveness in the agricultural field. Deep learning frameworks are developed with very useful features which include Theano, Tensor Flow, Keras etc.…”
Section: Literature Surveymentioning
confidence: 99%
“…Also, different data classification plans are assessed while training and testing of the model using the space related data. By assessing the classification precisions of time related and space related models, impact of time related links between observations are investigated [8].As deep learning is ruling the data technology, it doesn't fail to contribute its effectiveness in the agricultural field. Deep learning frameworks are developed with very useful features which include Theano, Tensor Flow, Keras etc.…”
Section: Literature Surveymentioning
confidence: 99%
“…Ganache, Metamask, and the provided hashing algorithm were used to build the decentralized application is shown in figure 1, figure 2. Distributed ledger technology (blockchain) could develop a trustworthy voting system [14]. All the votes would be recorded in the distributed ledger system, making it impossible to alter or forge the results [15].…”
Section: Blockchain-based E-voting Systemmentioning
confidence: 99%
“…Memory forensics is used to calculate integrity and retrieval of deleted files while network forensics is used to obtain external and internal IP addresses of cloud components [3]. The digital forensic process involves following phases: identification, collection, examination, analysis, reporting with the presentation [8], as shown in Figure 1.…”
Section: Cloud Forensic Architecturementioning
confidence: 99%