Research Paper | Computer Science & Engineering | India | Volume 8 Issue 1, January 2019
Design and Implementation of Attack Detection Technique using Forensic Investigators in Cloud Environment
Sonali Ogra, Prof. Praneet Khare, Prof. Anurag Shrivastava
Design and implementation of attack detection technique using forensic investigators in cloud environment
Keywords: Cloud Computing, Cloud forensics, Digital Forensics, Cloud Forensics model
Edition: Volume 8 Issue 1, January 2019
Pages: 241 - 244
How to Cite this Article?
Sonali Ogra, Prof. Praneet Khare, Prof. Anurag Shrivastava, "Design and Implementation of Attack Detection Technique using Forensic Investigators in Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20194034, Volume 8 Issue 1, January 2019, 241 - 244
232 PDF Views | 156 PDF Downloads
Similar Articles with Keyword 'Cloud Computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Similar Articles with Keyword 'Digital Forensics'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2452 - 2455A Review on Big Data Management and NoSQL Databases in Digital Forensics
Nikhil Mangle, Prof. Praful B. Sambhare
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1404 - 1408A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches
Dhara Anandpara, Rohit Srivastava
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1544 - 1551Security Measures in SCADA Systems
Steffi Paul Kalib, Manoj K. Rawat
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2024 - 2027A Survey on Corrupted Video Recovery Using CODEC Specifications
Avinash Deshmukh, Manisha Desai
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 205 - 208Recovering Deleted Files from NTFS
Rincy Roy Oommen, Princy Sugathan