Digital Library


Search: "[ keyword: Forensic ]" (30)
    Automatic Creation of Forensic Indicators with Cuckoo Sandbox and Its Application
    Kang Boong Gu, Yoon Jong Seong, Lee Min Wook, Lee Sang Jin KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 11, pp. 419-426, Nov. 2016
    10.3745/KTCCS.2016.5.11.419
    Keywords: Incident Response, Indicators of Compromise(IOC), Digital Forensic, Cuckoo Sandbox

    A Study on the Evidence Investigation of Forged/Modulated Time-Stamp at iOS(iPhone, iPad)
    Sanghyun Lee, Yunho Lee, Sangjin Lee KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 7, pp. 173-180, Jul. 2016
    10.3745/KTCCS.2016.5.7.173
    Keywords: iOS Forensic, Forged Time-Stamp, Modulated Time-Stamp, iPhone Forensic, Digital Forensic

    Digital Forensics Investigation of Redis Database
    Choi Jae Mun , Jeong Doo Won , Yoon Jong Seong , Lee Sang Jin KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 5, pp. 117-126, May. 2016
    10.3745/KTCCS.2016.5.5.117

    Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application
    Lee Min Wook , Yoon Jong Seong , Lee Sang Jin KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 4, pp. 95-102, Apr. 2016
    10.3745/KTCCS.2016.5.4.95

    Selective Recovery of the SSD TRIM Command in Digital Forensics
    Hyun Ho Hwang , Dong Joo Park KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 9, pp. 307-314, Sep. 2015
    10.3745/KTCCS.2015.4.9.307

    A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection
    Munkhbaatar Doyoddorj KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 5, pp. 163-172, May. 2014
    10.3745/KTCCS.2014.3.5.163

    High Speed Kernel Data Collection method for Analysis of Memory Workload
    Jun Young Yoon , Seung Wan Jung , Jong Woo Park , Jung Joon Kim , Dae Wha Seo KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 11, pp. 461-470, Nov. 2013
    10.3745/KTCCS.2013.2.11.461

    A Text Mining -based Intrusion Log Recommendation in Digital Forensics
    Sujeong Ko KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 6, pp. 265-276, Jun. 2013
    10.3745/KTCCS.2013.2.6.265

    Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation
    Min Su Park , Jung Heum Park , Sang Jin Lee KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 2, pp. 93-102, Feb. 2013
    10.3745/KTCCS.2013.2.2.93

    A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header
    Jung Sun Kim , Jung Min Kang , Kang San Kim , Wook Shin KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 1, pp. 43-50, Jan. 2013
    10.3745/KTCCS.2013.2.1.43