Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems
by
Mehmood, Danish
, Kazim, Muhammad
, Iqbal, Zafar
, Javed, Muhammad Shanawar
, Mansoor, Khawaja
, Muhammad, Zia
, Sajjad, Syed Muhammad
in
anonymity
/ Artifact identification
/ Automation
/ Autopsies
/ Collaboration
/ Computer forensics
/ Criminal investigations
/ Cybersecurity
/ digital forensics
/ Efficiency
/ Evidence
/ Forensic computing
/ Forensic sciences
/ Internet
/ Law enforcement
/ Methods
/ Privacy
/ Reverse engineering
/ Right of privacy
/ Tor Browser
/ web forensics
/ Windows (computer programs)
/ Windows-based systems
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems
by
Mehmood, Danish
, Kazim, Muhammad
, Iqbal, Zafar
, Javed, Muhammad Shanawar
, Mansoor, Khawaja
, Muhammad, Zia
, Sajjad, Syed Muhammad
in
anonymity
/ Artifact identification
/ Automation
/ Autopsies
/ Collaboration
/ Computer forensics
/ Criminal investigations
/ Cybersecurity
/ digital forensics
/ Efficiency
/ Evidence
/ Forensic computing
/ Forensic sciences
/ Internet
/ Law enforcement
/ Methods
/ Privacy
/ Reverse engineering
/ Right of privacy
/ Tor Browser
/ web forensics
/ Windows (computer programs)
/ Windows-based systems
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems
by
Mehmood, Danish
, Kazim, Muhammad
, Iqbal, Zafar
, Javed, Muhammad Shanawar
, Mansoor, Khawaja
, Muhammad, Zia
, Sajjad, Syed Muhammad
in
anonymity
/ Artifact identification
/ Automation
/ Autopsies
/ Collaboration
/ Computer forensics
/ Criminal investigations
/ Cybersecurity
/ digital forensics
/ Efficiency
/ Evidence
/ Forensic computing
/ Forensic sciences
/ Internet
/ Law enforcement
/ Methods
/ Privacy
/ Reverse engineering
/ Right of privacy
/ Tor Browser
/ web forensics
/ Windows (computer programs)
/ Windows-based systems
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems
Journal Article
Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems
2024
Request Book From Autostore
and Choose the Collection Method
Overview
The Tor browser is widely used for anonymity, providing layered encryption for enhanced privacy. Besides its positive uses, it is also popular among cybercriminals for illegal activities such as trafficking, smuggling, betting, and illicit trade. There is a need for Tor Browser forensics to identify its use in unlawful activities and explore its consequences. This research analyzes artifacts generated by Tor on Windows-based systems. The methodology integrates forensic techniques into incident responses per NIST SP (800-86), exploring areas such as registry, storage, network, and memory using tools like bulk-extractor, autopsy, and regshot. We propose an automated PowerShell script that detects Tor usage and retrieves artifacts with minimal user interaction. Finally, this research performs timeline analysis and artifact correlation for a contextual understanding of event sequences in memory and network domains, ultimately contributing to improved incident response and accountability.
This website uses cookies to ensure you get the best experience on our website.