Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
When computer systems are increasingly important for our daily activities, cybercrime has created challenges for the criminal justice system. Data can be hidden in ADS (Alternate Data Stream) without hindering performance. This feature has been exploited by malware authors, criminals, terrorists, an...
Main Author: | Da-Yu Kao |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-07-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/10/13/4686 |
Similar Items
-
A framework of reading timestamps for surveillance video
by: Jun Cheng, et al.
Published: (2019-02-01) -
Securing the Timestamping of Sensor Data from Wearable Healthcare Devices
by: Muhammad Siddiqi, et al.
Published: (2016-12-01) -
Computer Forensics Method in Analysis of Files Timestamps in Microsoft Windows Operating System and NTFS File System
by: Vesta Sergeevna Matveeva, et al.
Published: (2013-02-01) -
Coverless information hiding based on the generation of anime characters
by: Yi Cao, et al.
Published: (2020-09-01) -
Timestamp Estimation in P802.15.4z Amendment
by: Ioan Domuta, et al.
Published: (2020-09-01)