|
Volumn 180 LNEE, Issue , 2012, Pages 119-126
|
Forensic analysis of Digsby log data to trace suspected user activities
|
Author keywords
Digital forensics; Digsby; Insider attack; Password decryption
|
Indexed keywords
CONVENTIONAL APPROACH;
CYBER-CRIMES;
DIGITAL FORENSIC;
DIGSBY;
ENCRYPTION METHODS;
END USERS;
FORENSIC ANALYSIS;
INSIDER ATTACK;
INSTANT MESSAGING;
INTELLIGENCE AGENCIES;
LOG DATA;
ONLINE SOCIAL NETWORKS;
PASSWORD DECRYPTION;
USER ACTIVITY;
VITAL SOURCES;
WINDOWS REGISTRY;
AUTHENTICATION;
ELECTRONIC CRIME COUNTERMEASURES;
INFORMATION MANAGEMENT;
INFORMATION TECHNOLOGY;
TRACE ANALYSIS;
|
EID: 84865986338
PISSN: 18761100
EISSN: 18761119
Source Type: Book Series
DOI: 10.1007/978-94-007-5083-8_16 Document Type: Conference Paper |
Times cited : (3)
|
References (11)
|