Now showing items 1-2 of 2
In-The-Wild Residual Data Research and Privacy
(Journal of Digital Forensics, Security and Law, 2016)
As the world becomes increasingly dependent on technology, researchers in industry and academia endeavor to understand how technology is used, the impact it has on everyday life, the artifact life-cycle and overall ...
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations
(Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019-01)
An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, ...