Browsing by Subject "Computer science"
Now showing items 1-3 of 3
-
An analysis into the exploitation of the post-attendee URL feature in Zoom webinar regarding malware transmission
(2022)In response to the COVID-19 pandemic, large businesses and organizations relied on video conferencing applications such as Zoom to maintain public health guidelines due in part to their robust set of features to facilitate ... -
Google Drive forensic analysis via application programming interface.
(2015)Rapid development of cloud computing brings challenges to digital forensic investigation, where traditional digital forensic tools and methodologies do not apply well. New approaches are needed to overcome emerged problems. ... -
Use of forensic corpora in validation of data carving on solid-state drives.
(2016)The need for greater focus on the validation and verification of tools has become more evident in recent years. The research in this area has been minimal. Continued research regarding the validation of digital forensics ...