File Time of Forensic Evidence – Example of NTFS and ExtX
碩士 === 華梵大學 === 資訊管理學系碩士班 === 98 === When the information technology and network is getting popular more and more, it makes everyone in the world to have convenience. When something is getting popular, it will be crime tools. Every action always have some method to trace, so do the crimes. What a...
Main Authors: | Shih-Kang Yen, 顏世剛 |
---|---|
Other Authors: | Huei-Chung Chu |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/16235860964753247873 |
Similar Items
-
Computer Forensics Method in Analysis of Files Timestamps in Microsoft Windows Operating System and NTFS File System
by: Vesta Sergeevna Matveeva, et al.
Published: (2013-02-01) -
STEALTH: A Method of Hiding and Encrypting Files in NTFS
by: Syun-cheng Ou, et al.
Published: (2013) -
System Design of Active Detection for Alternate Data Streams in the NTFS File
by: Wen-Tang Tseng, et al.
Published: (2012) -
Ext4 and XFS File System Forensic Framework Based on TSK
by: Hyungchan Kim, et al.
Published: (2021-09-01) -
ADS Analytics on NTFS Date-time Stamps for Event Reconstruction
by: CHEN, YUAN-PEI, et al.
Published: (2018)