2017 5th International Conference on Information and Communication Technology (ICoIC7) 2017
DOI: 10.1109/icoict.2017.8074695
|View full text |Cite
|
Sign up to set email alerts
|

Digital forensics random access memory using live technique based on network attacked

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Most systems have their drives encrypted and protected with keys, these encryption keys and other cryptographic materials are being stored in the RAM after the drive has been decrypted and mounted on the first instance [5]. Encryption has well been embraced by computer users; both the good and bad guys.…”
Section: Introductionmentioning
confidence: 99%
“…Most systems have their drives encrypted and protected with keys, these encryption keys and other cryptographic materials are being stored in the RAM after the drive has been decrypted and mounted on the first instance [5]. Encryption has well been embraced by computer users; both the good and bad guys.…”
Section: Introductionmentioning
confidence: 99%