Digital Library
Search: "[ keyword: Forensic ]" (30)
Automatic Creation of Forensic Indicators with Cuckoo Sandbox and Its Application
Kang Boong Gu, Yoon Jong Seong, Lee Min Wook, Lee Sang Jin KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 11, pp. 419-426,
Nov.
2016
10.3745/KTCCS.2016.5.11.419
Keywords: Incident Response, Indicators of Compromise(IOC), Digital Forensic, Cuckoo Sandbox
10.3745/KTCCS.2016.5.11.419
Keywords: Incident Response, Indicators of Compromise(IOC), Digital Forensic, Cuckoo Sandbox
A Study on the Evidence Investigation of Forged/Modulated Time-Stamp at iOS(iPhone, iPad)
Sanghyun Lee, Yunho Lee, Sangjin Lee KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 7, pp. 173-180,
Jul.
2016
10.3745/KTCCS.2016.5.7.173
Keywords: iOS Forensic, Forged Time-Stamp, Modulated Time-Stamp, iPhone Forensic, Digital Forensic
10.3745/KTCCS.2016.5.7.173
Keywords: iOS Forensic, Forged Time-Stamp, Modulated Time-Stamp, iPhone Forensic, Digital Forensic
Digital Forensics Investigation of Redis Database
Choi Jae Mun , Jeong Doo Won , Yoon Jong Seong , Lee Sang Jin KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 5, pp. 117-126,
May.
2016
10.3745/KTCCS.2016.5.5.117
10.3745/KTCCS.2016.5.5.117
Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application
Lee Min Wook , Yoon Jong Seong , Lee Sang Jin KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 4, pp. 95-102,
Apr.
2016
10.3745/KTCCS.2016.5.4.95
10.3745/KTCCS.2016.5.4.95
Selective Recovery of the SSD TRIM Command in Digital Forensics
Hyun Ho Hwang , Dong Joo Park KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 9, pp. 307-314,
Sep.
2015
10.3745/KTCCS.2015.4.9.307
10.3745/KTCCS.2015.4.9.307
A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection
Munkhbaatar Doyoddorj KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 5, pp. 163-172,
May.
2014
10.3745/KTCCS.2014.3.5.163
10.3745/KTCCS.2014.3.5.163
High Speed Kernel Data Collection method for Analysis of Memory Workload
Jun Young Yoon , Seung Wan Jung , Jong Woo Park , Jung Joon Kim , Dae Wha Seo KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 11, pp. 461-470,
Nov.
2013
10.3745/KTCCS.2013.2.11.461
10.3745/KTCCS.2013.2.11.461
A Text Mining -based Intrusion Log Recommendation in Digital Forensics
Sujeong Ko KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 6, pp. 265-276,
Jun.
2013
10.3745/KTCCS.2013.2.6.265
10.3745/KTCCS.2013.2.6.265
Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation
Min Su Park , Jung Heum Park , Sang Jin Lee KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 2, pp. 93-102,
Feb.
2013
10.3745/KTCCS.2013.2.2.93
10.3745/KTCCS.2013.2.2.93
A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header
Jung Sun Kim , Jung Min Kang , Kang San Kim , Wook Shin KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 1, pp. 43-50,
Jan.
2013
10.3745/KTCCS.2013.2.1.43
10.3745/KTCCS.2013.2.1.43