نتایج جستجو برای: digital forensic artifacts

تعداد نتایج: 354431  

Journal: :Physics in Medicine and Biology 2014

2015
Stefan Nagy Imani Palmer Sathya Chandran Sundaramurthy Xinming Ou Roy Campbell

The forensic process relies on the scientific method to scrutinize recovered evidence that either supports or negates an investigative hypothesis. Currently, analysis of digital evidence remains highly subjective to the forensic practitioner. Digital forensics is in need of a deterministic approach to obtain the most judicious conclusions from evidence. The objective of this paper is to examine...

2015

The pervasiveness of the Internet, increased number of devices and the dissemination of ICT have played a big role in the increase in number of security incidents and adversaries in the cloud. However, there are limited proactive strategies that can enable mitigation of these incidents given the distributed nature of cloud resources. Therefore, the primary aim of the work described in this prop...

Journal: :Digital Investigation 2007
M. N. A. Khan Chris R. Chatwin Rupert C. D. Young

Digital forensic analysis Neural networks a b s t r a c t Post-event timeline reconstruction plays a critical role in forensic investigation and serves as a means of identifying evidence of the digital crime. We present an artificial neural networks based approach for post-event timeline reconstruction using the file system activities. A variety of digital forensic tools have been developed dur...

2009
Richard E. Overill Michael Y. K. Kwan K. P. Chow Pierre K. Y. Lai Frank Y. W. Law

Because of the way computers operate, every discrete event potentially leaves a digital trace. These digital traces must be retrieved during a digital forensic investigation to prove or refute an alleged crime. Given resource constraints, it is not always feasible (or necessary) for law enforcement to retrieve all the related digital traces and to conduct comprehensive investigations. This pape...

Journal: :J. Information Security 2012
Shweta Tripathi Bandu Baburao Meshram

Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing w...

Journal: :Veterinary radiology & ultrasound : the official journal of the American College of Veterinary Radiology and the International Veterinary Radiology Association 2008
Wm Tod Drost David J Reese William J Hornof

Radiographic artifacts may mimic a clinical feature, impair image quality, or obscure abnormalities. With the development of digital radiography (DR), a new set of artifacts is introduced. Regardless of the technology, the classic technical errors that occur with film screen radiography still occur using DR. Artifacts created using computed radiography, DR, and incorrect image processing are di...

Journal: :CoRR 2018
Saad Alabdulsalam Kevin Schaefer M. Tahar Kechadi Nhien-An Le-Khac

Today is the era of Internet of Things (IoT), millions of machines such as cars, smoke detectors, watches, glasses, webcams, etc. are being connected to the Internet. The number of machines that possess the ability of remote access to monitor and collect data is continuously increasing. This development makes, on one hand, the human life more comfortable, convenient, but it also raises on other...

2010
Sipho Ngobeni Hein S. Venter Ivan Burke

Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital f...

2009
F. Law

Computers operate at discrete points in time and hence digital traces are discrete events in temporal logic that reflect the occurrence of computer processes. From the perspective of a digital investigation, it is the duty of digital investigators or forensic examiners to retrieve digital traces so as to prove or to refute the alleged computer acts. Given the resource constraints of most organi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید