نتایج جستجو برای: digital forensic artifacts

تعداد نتایج: 354431  

Journal: :Journal of the National Academy of Forensic Engineers 2023

Structural fires globally have a catastrophic impact on loss of life, property damage, and socioeconomic factors. Forensic scientists, engineers, and/or fire investigators — often working together as investigation practitioners are commonly tasked with determining both the area origin its cause. During course investigation, practitioner may implement an determination methodology termed “arc map...

2010
Suneeta Satpathy Sateesh K. Pradhan

With overwhelming use of Internet, security in Cyberspace has become a prime concern. The forensic digital analysis as a whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology, so it is at the mercy of ever more new and complex computing approaches. Forensic digital analysis is unique among the forensic sciences in that it is inherently mathemati...

2014
Soltan Abed Alharbi

Digital Forensics (DF) is defined as the ensemble of methods, tools and techniques used to collect, preserve and analyse digital data originating from any type of digital media involved in an incident with the purpose of extracting valid evidence for a court of law. DF investigations are usually performed as a response to a digital crime and, as such, they are termed Reactive Digital Forensic (...

2011
Kailash Kumar Sanjeev Sofat Naveen Aggarwal

The dramatic increase in crime relating to the Internet and computers has caused a growing need for computer forensics. Computer forensic tools have been developed to assist computer forensic investigators in conducting a proper investigation into digital crimes. Digital forensics is a growing and important fields of research for current intelligence, law enforcement, and military organizations...

2014
Prashant K. Khobragade Latesh G. Malik

Digital forensic is part of forensic science that unconditionally covers cyber crimes. In a cyber crime digital forensic evidence examination requires a special process and techniques in examination of cyber crime in crime scene and examination of evidence are accepted in law enforcement. Cyber crime involves log data, transactional data is occurs which tends to plenty of data for storage and a...

Journal: :IJDE 2003
Brian D. Carrier

This paper uses the theory of abstraction layers to describe the purpose and goals of digital forensic analysis tools. Using abstraction layers, we identify where tools can introduce errors and provide requirements that the tools must follow. Categories of forensic analysis types are also defined based on the abstraction layers. Abstraction layers are not a new concept, but their usage in digit...

2007
Erin E. Kenneally Christopher L. T. Brown

Over the past decade or so, well-understood procedures and methodologies have evolved within computer forensics digital evidence collection that emphasized disk imaging procedures. In their paper Risk Sensitive Digital Evidence Collection [3], the authors posit that the current methodology which focuses on collecting entire bit-stream images of original evidence disk could increase legal and fi...

2014
Emilio Raymond Mumba

Existing digital forensic investigation process models have provided guidelines for identifying and preserving potential digital evidence captured from a crime scene. However, for any of the digital forensic investigation process models developed across the world to be adopted and fully applied by the scientific community, it has to be tested. For this reason, the Harmonized Digital Forensic In...

2007
Daniel A. Ray Phillip G. Bradford

There are numerous and diverse digital forensics models for driving digital investigative processes. To encompass these diverse models we argue that there is need for two integrated Domain-Specific Languages (DSLs) [5]: a static one and a dynamic one. We attempt to motivate some research directions involving DSLs, digital forensics, and the creation of two descriptive languages for digital fore...

Journal: :Journal of Cloud Computing 2022

Abstract A container provides an environment where applications are packaged and run with the supporting libraries dependencies. Due to scalability efficient software deployment, popularity of technology has increased its services also available on cloud platforms. The is prone a variety threats vulnerabilities that lead security breaches attacks. Investigation required analyze attack digital f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید