{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:10:04Z","timestamp":1654128604209},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4,1]]},"abstract":"
Computer forensics is the discipline that deals with the acquisition, investigation, preservation, and presentation of digital evidence in the court of law. Whereas antiforensics is the terminology used to describe malicious activities deployed to delete, alter, or hide digital evidence with the main objective of manipulating, destroying, and preventing the creation of evidence. Various antiforensic methodologies and tools can be used to interfere with digital evidence and computer forensic tools. However, memory-based antiforensic techniques are of particular interest because of their effectiveness, advanced manipulation of digital evidence, and attack on computer forensic tools. These techniques are mainly performed in volatile memory using advanced data alteration and hiding techniques. For these reasons memory-based antiforensic techniques are considered to be unbeatable. This article aims to present some of the current antiforensic approaches and in particular reports on memory-based antiforensic tools and techniques.<\/p>","DOI":"10.4018\/jisp.2008040101","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:54:52Z","timestamp":1297796092000},"page":"1-13","source":"Crossref","is-referenced-by-count":1,"title":["Memory-Based Antiforensic Tools and Techniques"],"prefix":"10.4018","volume":"2","author":[{"given":"Hamid","family":"Jahankhani","sequence":"first","affiliation":[{"name":"University of East London, UK"}]},{"given":"Elidon","family":"Beqiri","sequence":"additional","affiliation":[{"name":"University of East London, UK"}]}],"member":"2432","container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=2478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:38:16Z","timestamp":1654126696000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2008040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2008,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,4]]}},"URL":"http:\/\/dx.doi.org\/10.4018\/jisp.2008040101","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":["Information Systems"],"published":{"date-parts":[[2008,4,1]]}}}