نتایج جستجو برای: forensics

تعداد نتایج: 3917  

2013
Ragib Hasan

Today’s cloud computing architectures often lack support for computer forensic investigations. Besides this, the existing digital forensics tools cannot cope with the dynamic nature of the cloud. This paper explores the challenges of digital forensics in the cloud, possible attacks on cloud-evidence, and mitigation strategies against those challenges. Digital Forensics in the Cloud To identify ...

2007
Krishnun Sansurooah

Personal Digital Assistants most commonly known as PDAs are becoming more and more fashionable and affordable in the working environment. With the advent and rapidly increasing technology these handled devices are now targeted by a lot of person with criminal intentions. But unfortunately crime does not choose its technology and nowadays those ultra light handhelds are getting more and more inv...

2014
Spencer Hanson

I Passwords and Their Hashes . . . . . . . . 5 Abstract—Computer Forensics is a new field that uses traditional investigation processes and applies them to investigating a computer for digital evidence. In this paper, we will discuss the background of computer forensics and process of a digital investigation of a computer. Technical topics such cryptographic hashing and data hiding will be cove...

Journal: :IACR Cryptology ePrint Archive 2008
Yacov Yacobi

We analyze how well forensic systems reduce counterfeiting of software and content. We make a few idealized assumptions, and show that if the revenues of the producer before the introduction of forensics (Ro) are non-zero then the payo¤ of forensics is independent of the overall market size, it declines as the ratio between the penalty and the crime (both monetized) goes up, but that this behav...

2014
Shinichi Matsumoto Yuya Onitsuka Junpei Kawamoto Kouichi Sakurai

Importance of digital forensics is expected to increase in the future.Many of researches on digital forensics are targeted to persistent memory. These researches concerns about the extraction of evidence directly or via filesystem. On the other hand, there is a movement to employ the Web browser supports HTML5 as software platform. In this situation, it is considered that the forensics techniqu...

2008
Hsien-Ming Hsu Yeali S. Sun Meng Chang Chen

We propose a collaborative forensics framework to trace back callers of VoIP services in a multi-network environment. The paper is divided into two parts. The first part discusses the critical components of SIP-based telephony and determines the information needed for traceback in single and multiple Autonomous Systems (ASs). The second part proposes the framework and the entities of collaborat...

Journal: :IJDE 2004
Matthew Meyers Marc Rogers

This paper is a call for standardization and certification for the computer forensics field. It presents an overview of some of the more serious issues in the maturing discipline of computer forensics and explores three areas within the legal system where computer forensics is most likely to be questioned: search and seizure, expert qualifications, and analysis and preservation. One problem are...

Journal: :CoRR 2009
Serguei A. Mokhov

This paper introduces a novel concept of self-forensics to complement the standard autonomic self-CHOP properties of the self-managed systems, to be specified in the Forensic Lucid language. We argue that self-forensics, with the forensics taken out of the cybercrime domain, is applicable to “self-dissection” for the purpose of verification of autonomous software and hardware systems of flight-...

2010
Marthie Grobler

With the explosion of digital crime, digital forensics is more often applied. The digital forensic discipline developed rather rapidly, but up to date very little international standardisation with regard to processes, procedures or management has been developed. This article provides a brief overview of the current international standards in the digital forensics domain. It describes the neces...

Journal: :JDFSL 2009
Grover S. Kearns

Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting tha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید