Journal of Applied Mathematics / 2015 / Article / Tab 13

Research Article

Investigation Methodology of a Virtual Desktop Infrastructure for IoT

Table 13

Comparison of hash values for various tools.

IndexOriginal virtual
hard disk
Copy of virtual
hard disk
Result

EnCaseC69289228xxxxxx64C4D1298xxxxxxMismatch
FTKC5F64F49CxxxxxxC5F64F49CxxxxxxMatch
X-Way ForensicsC5F64F49CxxxxxxC5F64F49CxxxxxxMatch

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.