최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기사물인터넷융복합논문지 = Journal of internet of things and convergence, v.9 no.3, 2023년, pp.7 - 12
이현섭 (백석대학교 컴퓨터공학부)
One of the most important characteristics of digital forensics is integrity. Integrity means that the data has not been tampered with. If evidence is collected during digital forensic and later tampered with, it cannot be used as evidence. With analog evidence, it's easy to see if it's been tampered...
H.J.Seong, J.H.Jung, K.R.Park and S.J.Cho, "Research?Trends in Vehicle Digital Forensics Focused on?Infotainment Systems and Mobile Devices," Journal of?KIISE, Vol.41, No.1, pp.38-45, 2023.
J.O.Lee and T.S.Shin, "Forensics for Android and?Linux-based file system on IoT platform," Journal of?Digital Contents Society, Vol.23, No.2, pp.335-342,?2023.
W.K.Jung and S.J.Lee, "Measures to maintain the?admissibility of evidence for taking over digital?evidence in accordance with the adjustment of the?police.prosecution investigation authority," Journal?of Digital Forensics, Vol.16, No.2, pp.126-141, 2022.
H.J.Jung and S.J.Lee, "Digital forensic technology?trends in the Internet of Things era," Journal of KIISE,?Vol.38, No.9, pp.33-39, 2020.
S.B.Suhaili, C.C.A.Niam, Z.M.Zainn and N.Julai,?"Design and Implementation of MD5 Hash Function?Algorithm Using Verilog HDL," Proceedings of the?12th National Technical Seminar on Unmanned?System Technology 2020, Vol.770, pp.499-510, 2021.
U.Kumar and V.C.Venkaiah, "A New Modified?MD5-224 Bits Hash Function and an Efficient Message?Authentication Code Based on Quasigroups," Cyber?Security, Privacy and Networking, Vol.370, 2022.
F.Zhai, P.Tao, B.Xu, X.Liang and Y.Cao, "Research?and System Design of Remote Comparison Method for?Embedded Device Files," 2022 International?Symposium on Advances in Informatics, Electronics?and Education (ISAIEE). pp.137-141, 2022.
M.Ali, A.Ismail, H.Elgohary, S.Darwish and S.Mesbah,?"A Procedure for Tracing Chain of Custody in Digital?Image Forensics: A Paradigm Based on Grey Hash and?Blockchain," Symmetry, Vol.14 No.2, pp.344, 2022.
Z.Wang, X.Dong, Y.Kang and H.Chen, "Parallel?SHA-256 on SW26010 many-core processor for?hashing of multiple messages," The Journal of?Supercomputing, Vol.79, pp.2332-2355, 2022.
E.A.Adeniy, P.B.Falola, M.S.Maashi, M.Aljebreen and?S.Bharany," Information, Vol.13, No.10, pp.442, 2022.
M.Yang, Y.Zhang, B.Yang, H.Wang, S.Yin, S.Wei,?L.Liu, "A SHA-512 Hardware Implementation Based on?Block RAM Storage Structure," 2022 IEEE International?Parallel and Distributed Processing Symposium?Workshops (IPDPSW), pp.132-135, 2022.
D.P.Purba, "Analisa Dan Perbandingan Algoritma?Whirpool Dan Sha-512 Dalam Penyandian Data?Gambar," Bulletin of Artificial Intelligence, Vol.1,?No.1, pp.8-12, 2022.
H.S.Lee, "A Prediction-Based Data Read Ahead Policy?using Decision Tree for improving the performance of?NAND flash memory based storage devices," The?Korea Internet of Things Society, Vol.8, No.4,?pp.9-15, 2022.
H.S.Lee, "A Safety IO Throttling Method Inducting?Differential End of Life to Improving the Reliability of?Big Data Maintenance in the SSD based RAID," The?Society of Digital Policy & Management, Vol.20, No.5,?pp.593-598, 2022.
H.S.Lee, "Performance analysis and prediction?through various over-provision on NAND flash?memory based storage," The Society of Digital Policy?& Management, Vol.20, No.3, pp.343-348, 2022.
H.S.Lee, "A method for optimizing lifetime prediction?of a storage device using the frequency of occurrence?of defects in NAND flash memory," The Korea?Internet of Things Society, Vol.7, No.4, pp.9-14, 2021.?
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.