:::

詳目顯示

回上一頁
題名:無痕瀏覽模式調查惡意攻擊跡證
書刊名:資訊、科技與社會學報
作者:莊禾暘左瑞麟 引用關係柯宏叡洪國寶 引用關係王旭正
出版日期:2019
卷期:19
頁次:頁75-102
主題關鍵詞:記憶體鑑識Web應用程式漏洞SQL injectionCross-site scripting
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:3
期刊論文
1.Balasundaram, I.、Ramaraj, E.(2011)。An Authentication Scheme for Preventing SQL Injection Attack Using Hybrid Encryption。European Journal of Scientific Research,53(3),359-368。  new window
2.Chivers, H.(2014)。Private browsing: A window of forensic opportunity。Digital Investigation,11(1),20-29。  new window
3.Dave, R.、Mistry, N.、Dahiya, M. S.(2014)。Volatile Memory Based Forensic Artifacts & Analysis。International Journal for Research in Applied Science and Engineering Technology,2(1),120-124。  new window
4.Ghafarian, A.、Hosseini-Seno, Seyed Amin(2015)。Analysis of Privacy of Private Browsing Mode through Memory Forensics。International Journal of Computer Applications,132(16),27-34。  new window
5.Kaur, D.、Kaur, P.(2016)。Empirical Analysis of Web Attacks。Procedia Computer Science,78(1),298-306。  new window
6.柯博淞、林曾祥、王旭正、左豪官(20140300)。數位鑑識之無痕瀏覽器證據調查研究。電子商務學報,16(1),85-105。new window  延伸查詢new window
7.Petroni, N. L.、Walters, A.、Fraser, T.、Arbaugh, W. A.(2006)。FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory。Digital Investigation,3(4),197-210。  new window
8.Schatz, B.(2007)。BodySnatcher: towards reliable volatile memory acquisition by software。Digital Investigation,4(1),S126 -S134。  new window
9.Seo, J.、Lee, S.、Shon, T.(2015)。A study on memory dump analysis based on digital forensic tools。Peer-to-Peer Networking and Applications,8(4),694-703。  new window
10.Tsalis, N.、Mylonas, A.、Gritzalis, D.、Katos, V.(2017)。Exploring the protection of private browsing in desktop browsers。Computers & Security,67,181-197。  new window
會議論文
1.Hausknecht, K.、Foit, D.、Buric, J.(2015)。RAM data significance in Digital Forensics。38th International Convention on Information and Communication Technology, Electronics and Microelectronics,1372-1375。  new window
2.Ahmed, W.、Aslam, B.(2015)。A comparison of windows physical memory acquisition tools。IEEE Military Communications Conference,1292-1297。  new window
3.Dija, S.、Suma, G. S.、Gonsalvez, D. D.、Pillai, A. T.(2016)。Forensic reconstruction of executables from Endows 7 physical memory。IEEE International Conference on Computational Intelligence and Computing Research。  new window
4.Heriyanto, A.、Valli, C.、Hannay, P.(2015)。Comparison of Live Response, Linux Memory Extractor (LiME) and Mem Tool for Acquiring Android's Volatile Memory in the Malware Incident。Australian Digital Forensics Conference。  new window
5.Hua, Q.、Zhang, Y.(2015)。Detecting Malware and Rootkit via Memory Forensics。International Conference on Computer Science and Mechanical Automation。  new window
6.Johari, R.、Gupta, N.(2011)。Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network。International Conference on Network Security and Applications。  new window
7.Liming, C.、Jing, S.、Wei, Q.(2013)。Study on Forensic Analysis of Physical Memory。International Symposium on Computer,Communication, Control and Automation,221-224。  new window
8.Moh, M.、Pininti, S.、Doddapaneni, S.、Moh, T. S.(2016)。Detecting Web Attacks Using Multi-Stage Log Analysis。IEEE International Conference on Advanced Computing。  new window
9.Periyadi, G.、Mutiara, A.、Waya, R.(2017)。Digital forensics random access memory using live technique based on network attacked。International Conference on Information and Communication Technology。  new window
10.Sharma, C.、Jain, S. C.(2014)。Analysis and Classification of SQL Injection Vulnerabilities and Attacks on Web Applications。International Conference on Advances in Engineering & Technology Research。  new window
11.Suteva, N.、Mileva, A.(2014)。Computer Forensic Analysis of Some Web Attack。World Congress on Internet Security。  new window
其他
1.Reed, A.,Scanlon, M.(2017)。Forensic Analysis of Epic Privacy Browser on Windows Operating Systems,http://cyberforensicator.com/wp-content/uploads/2017/07IEpicPrivacyBrowsenLcompressed.pdf。  new window
2.OWASP Top Ten Project,http://www.owasp.org/index.php/Category: OWASP Top Ten Project.。  new window
3.12th Annual Application Security Statistics Report,https://info.whitehatsec.com/.。  new window
圖書論文
1.Montasari, R.、Peltola, P.(2015)。Computer Forensic Analysis of Private Browsing Modes。Global security, safety and sustainability: tomorrow's challenges of cyber security。Springer。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE