Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Traffic analysis consists of capturing network traffic in order to identify and respond to anomalies that could be indicative of security threats or other areas of concern. The communication, network, and technological infrastructures... more
    • by 
    •   11  
      Information TechnologyInformation SecurityNetwork AnalysisCybersecurity
Terrorism by an Islamist group known as Boko Haram has been raging in Nigeria since 2009 and has spilled over into neighboring countries of Cameroon, Chad and Niger. Consequently, two million people have been displaced, 100,000 lives lost... more
    • by 
    •   93  
      CommunicationPublic OpinionTerrorismInternational Terrorism
There has been a wide usage of anti-computer forensics all over the world. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. Mostly, these techniques hide or make it... more
    • by 
    •   22  
      Computer ScienceComputer ForensicsDigital InvestigationForensic Science