نتایج جستجو برای: digital forensic artifacts
تعداد نتایج: 354431 فیلتر نتایج به سال:
The forensic process relies on the scientific method to scrutinize recovered evidence that either supports or negates an investigative hypothesis. Currently, analysis of digital evidence remains highly subjective to the forensic practitioner. Digital forensics is in need of a deterministic approach to obtain the most judicious conclusions from evidence. The objective of this paper is to examine...
The pervasiveness of the Internet, increased number of devices and the dissemination of ICT have played a big role in the increase in number of security incidents and adversaries in the cloud. However, there are limited proactive strategies that can enable mitigation of these incidents given the distributed nature of cloud resources. Therefore, the primary aim of the work described in this prop...
Digital forensic analysis Neural networks a b s t r a c t Post-event timeline reconstruction plays a critical role in forensic investigation and serves as a means of identifying evidence of the digital crime. We present an artificial neural networks based approach for post-event timeline reconstruction using the file system activities. A variety of digital forensic tools have been developed dur...
Because of the way computers operate, every discrete event potentially leaves a digital trace. These digital traces must be retrieved during a digital forensic investigation to prove or refute an alleged crime. Given resource constraints, it is not always feasible (or necessary) for law enforcement to retrieve all the related digital traces and to conduct comprehensive investigations. This pape...
Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing w...
Radiographic artifacts may mimic a clinical feature, impair image quality, or obscure abnormalities. With the development of digital radiography (DR), a new set of artifacts is introduced. Regardless of the technology, the classic technical errors that occur with film screen radiography still occur using DR. Artifacts created using computed radiography, DR, and incorrect image processing are di...
Today is the era of Internet of Things (IoT), millions of machines such as cars, smoke detectors, watches, glasses, webcams, etc. are being connected to the Internet. The number of machines that possess the ability of remote access to monitor and collect data is continuously increasing. This development makes, on one hand, the human life more comfortable, convenient, but it also raises on other...
Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital f...
Computers operate at discrete points in time and hence digital traces are discrete events in temporal logic that reflect the occurrence of computer processes. From the perspective of a digital investigation, it is the duty of digital investigators or forensic examiners to retrieve digital traces so as to prove or to refute the alleged computer acts. Given the resource constraints of most organi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید