Index

  • Darkweb, 317
  • Data analysis, 283
  • Data carving, 257
  • Data diddling, 251
  • Data forensics, 147
  • Data sanitization, 341, 347
  • Data science processing with artificial intelligence models, 64
  • Data security, 73, 74, 75, 76
  • Data validation, 347
  • Database forensics, 118
  • Dataset, 281–282
  • DDoS, 296, 305
  • De facto Cyber & Physical Security (DCPS), 176, 182
  • Decentralized, 208, 221
  • Decision tree, 298, 309, 310
  • Deep learning and modelling, 67
  • Deep learning enabled cyber–forensic investigation analysis, 62, Fig 3.2
  • Deep learning, 276
  • Defense computer forensic laboratory, 110
  • Delegated Proof of Stake (DPoS), 209–210
  • Dementia, 94
  • Denial of service, 135–137, 250
  • Design security, 163, 165, 174
  • Diagonal basis, 50, 51
  • Digital forensic analysis knowledge, 61
  • Digital forensics, 107, 127–129, 142, 147, 150, 154–155, 157
  • Digital forensics history, 108
  • Digital forensics process, 244
  • Digital forensics tools, 119
  • Dimensionality reduction, 310
  • Directory traversal, 357
  • Disguised faces in wild, 235
  • Disk forensics, 141–143, 147
  • DL, 297, 298, 299, 301
  • Domain specific methods, 223, 224, 230, 231
  • DOM-based Cross Site Scripting (DOM-XSS), 344, 346
  • DoS, 301, 305
  • Double-chain, 216
  • Drug discovery and robotics, 100
  • E91 protocol, 51, 52, 55
  • ECML-PKDD 2007, 305
  • Elliptic curve cryptography (ECC), 48
  • Email forensic, 131, 133
  • Email spamming, 251
  • Embedded systems, 169
  • Emotional desires, 95
  • Encase, 119, 121
  • Entanglement, 51
  • Enterprise phase, 112
  • E-PRIP (Extended PRIP), 235
  • Error-based SQL Injection, 337
  • Ethical concerns and robotics, 95
  • Evidence collection and analysis, 118, Fig. 6.5
  • Evolutionary cycle of digital forensics, 111
  • EWF (Energy), 210
  • Exceptional case security assessment corpus, 173
  • Exploitation techniques, 344, 349, 354, 355, 358
  • Gamification, 179
  • Get and post method, 351
  • Google, 295, 297, 312
  • Grover’s algorithm, 47, 49
  • KDD Cup 1999, 305
  • Key distribution, 45
  • Knowledge on Stages of digital forensic analysis, 65
  • Operating system forensics, 145–147
  • OSForensics, 121, 123
  • Out of band SQL injection, 337, 340
  • Overview, 105
  • Oxygen forensics, 120, 122
  • Partial homomorphic encryption schemes, 77
  • Partial occlusion, 233, 235, 237, Fig. 10.11 Pattern recognition in deep learning algorithm, 68, Fig-3.7
  • Pattern recognition techniques, 63
  • Phases of digital investigation provides knowledge in forensic science analysis, 67 Fig-3.6
  • Phishing, 250, 274, 296, 298, 299, 131–133, 140, 142, 306, 312
  • Photo anthropometry, 231
  • Photon Number Splitting (PNS) Attack, 53
  • PHP-Data Object (PDO), 342
  • Physical capabilities of robots, 92
  • Physical security assessment corpus, 181, 182
  • Polarization, 50, 52
  • Post-quantum digital signatures, 45, 53
  • practical Byzantine Fault Tolerance (pBFT), 210
  • Practical challenges of quantum key distribution, 52
  • Precision, 284
  • Pre-processing, 283
  • Privacy, 9, 10 (Fig 1.2), 32 (Table 1.5), 33 (Table 1.6), 34 (Table 1.7), 73, 74, 75, 85, 86
  • Privacy breaching, 252
  • Proof of Burn (PoB), 209
  • Proof of Importance (PoI), 209
  • Proof of Stake (PoS), 209, 216
  • Proof of Work (PoW), 209, 216–217
  • Proposed key verification phase for BB84, 51
  • Protection techniques, 341, 347, 351, 355, 357, 358
  • Psychiatric care settings, 94
  • Union-based SQL Injection, 337
  • Unsupervised learning, 275
  • Use case diagram, 178, 179, 188, 192
  • Xplico, 120, 122
  • XSS injection, 347
  • XSS vulnerability, 344
  • X-ways forensics, 119
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset