[go: up one dir, main page]

Rogers, 2017 - Google Patents

Technology and digital forensics

Rogers, 2017

Document ID
6975675880205461313
Author
Rogers M
Publication year
Publication venue
The routledge handbook of technology, crime and justice

External Links

Snippet

This chapter focuses on the discipline of digital forensics. It examines the history of how criminals have been early adopters of technology to further their criminal trade craft. The chapter examines specific technologies that have either been used or targeted by cyber …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • G06F17/30657Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30244Information retrieval; Database structures therefor; File system structures therefor in image databases
    • G06F17/30247Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation

Similar Documents

Publication Publication Date Title
Butt et al. Cloud-based email phishing attack using machine and deep learning algorithm
Mughaid et al. An intelligent cyber security phishing detection system using deep learning techniques
Patil et al. A methodical overview on phishing detection along with an organized way to construct an anti-phishing framework
Jain et al. Phishing detection: analysis of visual similarity based approaches
US11630918B2 (en) Systems and methods of determining compromised identity information
Verma et al. Email phishing: Text classification using natural language processing
Arora et al. A review on application of GANs in cybersecurity domain
Arabia-Obedoza et al. Social engineering attacks a reconnaissance synthesis analysis
Bhadane et al. Detecting lateral spear phishing attacks in organisations
Shin et al. Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix
SAMUEL Enhancing financial fraud detection with AI and cloud-based big data analytics: Security implications
Priya et al. A comprehensive survey of recent phishing attacks detection techniques
Rogers Technology and digital forensics
Chowdhary et al. Phishing detection tool for financial emails
Canelón et al. Unstructured data for cybersecurity and internal control
Lai et al. Phishing and spoofing websites: Detection and countermeasures
Rahim et al. A survey on anti-phishing techniques: From conventional methods to machine learning
Alhathally et al. Cyber security Attacks: Exploiting weaknesses
Ahmed Toward Eradication of Phishing Attacks in E-government Systems
Barati Security Threats and Dealing with Social Networks
Njoku et al. URL Based Phishing Website Detection Using Machine Learning.
Halouzka et al. Personal cyber security in email communication
Chanthati How the Power of Machine–Machine Learning, Data Science and NLP Can Be Used to Prevent Spoofing and Reduce Financial Risks
Amaefule et al. Detection of phishing website using machine learning and features extraction
SMRITHY SINGH et al. A CENSORIOUS INTERPRETATION OF CYBER THEFT AND ITS FOOTPRINTS.