Keywords: تجزیه و تحلیل حافظه; Memory forensics; Computer forensics; Memory analysis; Windows 10; Linux; WSL;
مقالات ISI تجزیه و تحلیل حافظه (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: تجزیه و تحلیل حافظه; Microsoft windows; Memory analysis; Memory forensics; Hibernation file; Digital forensics;
Keywords: تجزیه و تحلیل حافظه; Memory analysis; Reverse engineering; Windows internals; Operating system; Forensic analysis; Malware detection; Intrusion detection;
Keywords: تجزیه و تحلیل حافظه; Database forensics; File carving; Memory analysis;
Keywords: تجزیه و تحلیل حافظه; Memory forensics; Computer forensics; Memory analysis; Incident response; Malware;
Keywords: تجزیه و تحلیل حافظه; Microsoft windows; Memory analysis; Memory forensics; Live forensics; Pool tag scanning; Pool scanning; Incident response;
Keywords: تجزیه و تحلیل حافظه; Windows; Memory analysis; Memory forensics; Robust analysis; OS fingerprinting;
Keywords: تجزیه و تحلیل حافظه; Database forensics; File carving; Data recovery; Memory analysis; Stochastic analysis;
Keywords: تجزیه و تحلیل حافظه; Memory analysis; Incident response; Memory Forensics; Compilers; Reverse Engineering; Malware; Linux Forensics; Digital Forensic Triaging;
Keywords: تجزیه و تحلیل حافظه; ML; regions; static analysis; memory analysis;
Keywords: تجزیه و تحلیل حافظه; Database forensics; File carving; Memory analysis; Stochastic analysis; Database storage modeling;
Keywords: تجزیه و تحلیل حافظه; Network forensics; Wifi probe requests; Wifi beacons; IEEE 802.11; Network carving; Memory analysis;
Keywords: تجزیه و تحلیل حافظه; Digital forensics; Memory analysis; Operating system fingerprinting; Approximate matching; sdhash;
Keywords: تجزیه و تحلیل حافظه; Forensic; Memory acquisition; Memory analysis; Navigation system; GPS; TomTom; ISP
Keywords: تجزیه و تحلیل حافظه; Memory analysis; Incident response; Binary classification; Memory forensics; Live forensics
Leveraging relocations in ELF-binaries for Linux kernel version identification
Keywords: تجزیه و تحلیل حافظه; Kernel version identification; Code fingerprinting; codeid-elf; Memory analysis; Derandomizing base address;
Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks
Keywords: تجزیه و تحلیل حافظه; Memory forensics; Computer forensics; Memory analysis; Incident response; Malware; Fuzzing;
The impact of GPU-assisted malware on memory forensics: AÂ case study
Keywords: تجزیه و تحلیل حافظه; Graphic processing units; Memory analysis; Malware; Digital Forensics; Direct Rendering Manager;
Advancing Mac OS X rootkit detection
Keywords: تجزیه و تحلیل حافظه; Memory analysis; Rootkits; Kernel level malware; Digital forensics; Incident response;
In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux
Keywords: تجزیه و تحلیل حافظه; Memory analysis; Live forensics; Compressed RAM; Virtual memory; Digital forensics;
Acquisition and analysis of volatile memory from android devices
Keywords: تجزیه و تحلیل حافظه; Android; Memory forensics; Memory analysis; Linux; Mobile device forensics
A survey of main memory acquisition and analysis techniques for the windows operating system
Keywords: تجزیه و تحلیل حافظه; Memory forensics; Memory acquisition; Memory analysis; Live forensics; Microsoft windows
Forensic acquisition and analysis of the Random Access Memory of TomTom GPS navigation systems
Keywords: تجزیه و تحلیل حافظه; Forensic; Memory acquisition; Memory analysis; Navigation system; GPS; TomTom; RAM; NMEA; JTAG; Linux
The persistence of memory: Forensic identification and extraction of cryptographic keys
Keywords: تجزیه و تحلیل حافظه; Digital forensics; Data hiding and recovery; Memory analysis; Memory dumping; Applied cryptography; Live analysis; Cryptographic evidence; Incident response; Tool testing and development
Extraction of forensically sensitive information from windows physical memory
Keywords: تجزیه و تحلیل حافظه; Computer forensics; Digital investigation; Windows memory; Sensitive information; Application fingerprint; Memory analysis; Stack analysis; String matching
FACE: Automated digital evidence discovery and correlation
Keywords: تجزیه و تحلیل حافظه; Memory analysis; Physical memory; Digital forensics; Evidence correlation; Disk image; Network capture; Log file; Forensics tool
Using every part of the buffalo in Windows memory analysis
Keywords: تجزیه و تحلیل حافظه; Windows; Memory analysis; Forensics; Invalid pages; Prototype; Pagefile
Identifying almost identical files using context triggered piecewise hashing
Keywords: تجزیه و تحلیل حافظه; Memory analysis; Forensics; Windows; Reverse engineering; Microsoft