• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Qureshi, Sirajuddin (Qureshi, Sirajuddin.) | Tunio, Saima (Tunio, Saima.) | Akhtar, Faheem (Akhtar, Faheem.) | Wajahat, Ahsan (Wajahat, Ahsan.) | Nazir, Ahsan (Nazir, Ahsan.) | Ullah, Faheem (Ullah, Faheem.)

Indexed by:

EI Scopus

Abstract:

With the evolution and popularity of computer networks, a tremendous amount of devices are increasingly being added to the global internet connectivity. Additionally, more sophisticated tools, methodologies, and techniques are being used to enhance global internet connectivity. It is also worth mentioning that individuals, enterprises, and corporate organizations are quickly appreciating the need for computer networking. However, the popularity of computer and mobile networking brings various drawbacks mostly associated with security and data breaches. Each day, cyber-related criminals explore and devise complicated means of infiltrating and exploiting individual and corporate networks’ security. This means cyber or network forensic investigators must be equipped with the necessary mechanisms of identifying the nature of security vulnerabilities and the ability to identify and apprehend the respective cyber-related offenders correctly. Therefore, this research’s primary focus is to provide a comprehensive analysis of the concept of network forensic investigation and describing the methodologies and tools employed in network forensic investigations by emphasizing on the study and analysis of the OSCAR methodology. Finally, this research provides an evaluative analysis of the relevant literature review in a network forensics investigation. © 2021. All Rights Reserved.

Keyword:

Computer forensics Computer networks Cybersecurity Network security Computer crime

Author Community:

  • [ 1 ] [Qureshi, Sirajuddin]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Tunio, Saima]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [Akhtar, Faheem]Department of Computer Science, Sukkur IBA University, Pakistan
  • [ 4 ] [Wajahat, Ahsan]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Nazir, Ahsan]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 6 ] [Ullah, Faheem]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

International Journal of Advanced Computer Science and Applications

ISSN: 2158-107X

Year: 2021

Issue: 5

Volume: 12

Page: 879-887

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:87

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:1948/10890875
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.