Techniques and Tools for Forensic Investigation of E-mail

@article{Banday2011TechniquesAT,
  title={Techniques and Tools for Forensic Investigation of E-mail},
  author={M. T. Banday},
  journal={International Journal of Network Security & Its Applications},
  year={2011},
  volume={3},
  pages={227-241}
}
  • M. T. Banday
  • Published 2011
  • Computer Science
  • International Journal of Network Security & Its Applications
E-mail has emerged as the most important application on Internet for communication of messages, delivery of documents and carrying out of transactions and is used not only from computers but many other electronic gadgets like mobile phones. Over a period of year’s e-mail protocols have been secured through several security extensions and producers, however, cybercriminals continue to misuse it for illegitimate purposes by sending spam, phishing e-mails, distributing child pornography, and hate… Expand
16 Citations
Review of E-mail System , Security Protocols and Email Forensics
  • 14
E-Mail Forensics: Techniques and Tools for ForensicInvestigation of One Court Case
  • Highly Influenced
An Empirical Analysis of Email Forensics Tools
  • PDF
Electronic mail forensic algorithm for crime investigation and dispute settlement
  • 1
Live forensics of tools on android devices for email forensics
  • 4
  • PDF
Improving Efficiency of E-mail Classification Through On-Demand Spam Filtering
  • Shafiya Afzal Sheikh, M. T. Banday
  • Computer Science
  • 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
  • 2020
  • Highly Influenced
Anonymous Mail Analysis Based Postfix SMTP Mail Server With Greedy Algorithm
...
1
2
...

References

SHOWING 1-10 OF 17 REFERENCES
An Investigation Into Computer Forensic Tools
  • 31
  • PDF
Tracing E-mail Headers
  • M. Al-Zarouni
  • Computer Science
  • Australian Computer, Network & Information Forensics Conference
  • 2004
  • 18
Internet Mail Architecture
  • 47
  • PDF
Evaluating Commercial Counter-Forensic Tools
  • 49
  • PDF
Enterprise wide electronic mail using IMAP
  • 2
Digital forensics research: The next 10 years
  • 548
  • PDF
Digital Forensics: Defining a Research Agenda
  • 36
  • PDF
A comparative study of Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP) and X.400 Electronic Mail Protocols
  • 30
The Domain Name System - Past, Present, and Future
  • 9
  • PDF
...
1
2
...