Rogers, 2017 - Google Patents
Technology and digital forensicsRogers, 2017
- Document ID
- 6975675880205461313
- Author
- Rogers M
- Publication year
- Publication venue
- The routledge handbook of technology, crime and justice
External Links
Snippet
This chapter focuses on the discipline of digital forensics. It examines the history of how criminals have been early adopters of technology to further their criminal trade craft. The chapter examines specific technologies that have either been used or targeted by cyber …
- 238000005516 engineering process 0 title abstract description 63
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
- G06F17/30657—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Butt et al. | Cloud-based email phishing attack using machine and deep learning algorithm | |
Mughaid et al. | An intelligent cyber security phishing detection system using deep learning techniques | |
Patil et al. | A methodical overview on phishing detection along with an organized way to construct an anti-phishing framework | |
Jain et al. | Phishing detection: analysis of visual similarity based approaches | |
US11630918B2 (en) | Systems and methods of determining compromised identity information | |
Verma et al. | Email phishing: Text classification using natural language processing | |
Arora et al. | A review on application of GANs in cybersecurity domain | |
Arabia-Obedoza et al. | Social engineering attacks a reconnaissance synthesis analysis | |
Bhadane et al. | Detecting lateral spear phishing attacks in organisations | |
Shin et al. | Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix | |
SAMUEL | Enhancing financial fraud detection with AI and cloud-based big data analytics: Security implications | |
Priya et al. | A comprehensive survey of recent phishing attacks detection techniques | |
Rogers | Technology and digital forensics | |
Chowdhary et al. | Phishing detection tool for financial emails | |
Canelón et al. | Unstructured data for cybersecurity and internal control | |
Lai et al. | Phishing and spoofing websites: Detection and countermeasures | |
Rahim et al. | A survey on anti-phishing techniques: From conventional methods to machine learning | |
Alhathally et al. | Cyber security Attacks: Exploiting weaknesses | |
Ahmed | Toward Eradication of Phishing Attacks in E-government Systems | |
Barati | Security Threats and Dealing with Social Networks | |
Njoku et al. | URL Based Phishing Website Detection Using Machine Learning. | |
Halouzka et al. | Personal cyber security in email communication | |
Chanthati | How the Power of Machine–Machine Learning, Data Science and NLP Can Be Used to Prevent Spoofing and Reduce Financial Risks | |
Amaefule et al. | Detection of phishing website using machine learning and features extraction | |
SMRITHY SINGH et al. | A CENSORIOUS INTERPRETATION OF CYBER THEFT AND ITS FOOTPRINTS. |