Handbook of Research on Network Forensics and Analysis Techniques

  • 11h 54m
  • Gulshan Shrivastava, et al.
  • IGI Global
  • 2018

With the rapid advancement in technology, myriad new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes.

The Handbook of Research on Network Forensics and Analysis Techniques is a current research publication that examines the advancements and growth of forensic research from a relatively obscure tradecraft to an important part of many investigations. Featuring coverage on a broad range of topics including cryptocurrency, hand-based biometrics, and cyberterrorism, this publication is geared toward professionals, computer forensics practitioners, engineers, researchers, and academics seeking relevant research on the development of forensic tools.

In this Book

  • Wireless Sensor Networks: A Technical Survey
  • Network Security: Attacks and Control in MANET
  • Cross-Layer Based Intrusion Detection and Prevention for Network
  • Security Issues in Web Services
  • Flawed Security of Social Network of Things
  • Artificial Intelligence Based Intrusion Detection System to Detect Flooding Attack in VANETs
  • Detection of Botnet Based Attacks on Network: Using Machine Learning Techniques
  • Denial-of-Service (DoS) Attack and Botnet: Network Analysis, Research Tactics, and Mitigation
  • Role of Cyber Security and Cyber Forensics in India
  • Cyberattacks, Cybercrime and Cyberterrorism
  • Cyber Crime Toolkit Development
  • On Creating Digital Evidence in IP Networks With NetTrack
  • Digital Forensics in Distributed Environment
  • Successful Computer Forensics Analysis on the Cyber Attack Botnet
  • Impact of Big Data on Security
  • The Impact of Big Data Analytics and Challenges to Cyber Security
  • Security and Privacy Challenges in Big Data Environment
  • Impact of Big Data on Security: Big Data Security Issues and Defense Schemes
  • A Comparative Review of Various Machine Learning Approaches for Improving the Performance of Stego Anomaly Detection
  • Audio Watermarking with Reduced Number of Random Samples
  • Bitcoin: Digital Decentralized Cryptocurrency
  • A Robust Biometrics System Using Finger Knuckle Print
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.4 of 91 users Rating 4.4 of 91 users (91)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)