نتایج جستجو برای: digital forensic artifacts
تعداد نتایج: 354431 فیلتر نتایج به سال:
One of the popularly used features on Android smartphone is WhatsApp. WhatsApp can be misused, such as for criminal purposes. To conduct investigation involving smartphone devices, the investigators need to use forensic tools. Nonetheless, the development of the existing forensic tool technology is not as fast as the development of mobile technology and WhatsApp. The latest version of smartphon...
Computer hard drives often contain evidence that is vital to digital forensic investigations. However, an authenticated working copy or “forensic image” of a suspect hard drive must be created before any data can be analyzed. As the capacities of modern hard drives increase, the time taken to create a forensic image, let alone analyze the data, increases significantly. This paper investigates t...
Ants (Hymenoptera: Formicidae) are an important component of insect biodiversity, and their study may help forensic entomologists to solve criminal cases. We review published literature and ecological principles that may guide forensic entomologists in the usage of ants as evidence with forensic value. Because ants are top predators in litter environments, their activities can affect decomposit...
ion and access in digital forensics, and how the two taxonomies are related. This presentation will impact the forensic community by introducing the digital forensic community to the theories and approaches utilized in the natural language processing community. Since the second World War, computer scientists and others have struggled to find computational methods to translate, understand, and m...
With the explosion of digital crime, digital forensics is more often applied. The digital forensic discipline developed rather rapidly, but up to date very little international standardisation with regard to processes, procedures or management has been developed. This article provides a brief overview of the current international standards in the digital forensics domain. It describes the neces...
Live digital forensics presents unique challenges with respect to maintaining forensic soundness, but also offers the ability to examine information that is unavailable to quiescent analysis. Any perturbation of a live operating system by a forensic examiner will have far-reaching effects on the state of the system being analysed. Numerous approaches to live digital forensic evidence acquisitio...
A Forensic Image is a is often accompanied by a calculated Hash signature to validate that the image is an exact duplicate of the original. It is mainly focus on detection of artifacts introduced by single processing tool. Hence making it necessary for developing several for detection of artifacts. In this paper we introduce two theoretical frameworks, based on DempsterShafer’s Theory of Eviden...
This paper introduces a new systematic process for describing digital investigations that focuses on forensic goals and anti-forensic obstacles and their operationalisation in terms of human and software actions. The main contribution of the paper is to demonstrate how this process can be used to capture the various forensic and anti-forensic aspects of a real world case study involving documen...
The advent of cloud computing provides good opportunities for both good and malicious use. Cloud computing is at its infancy stage and its security is still an open research issue. Malicious users take advantage of the current lack of advanced security mechanisms in the cloud. Cloud computing paradigm enables users to access computing resources without necessarily owning physical infrastructure...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید