نتایج جستجو برای: digital forensic artifacts
تعداد نتایج: 354431 فیلتر نتایج به سال:
Cloud computing is a rapidly evolving technological phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host its software applications, organizations are increasingly deploying the same into remote, virtualized environments, which can be hosted and manage by third party providers. This development in the IT landscape has significant implications for digital forens...
The focus of this paper is to design an efficient indexing structure for spatial-temporal-textual data in a digital library environment. Along with traditional document collections, modern digital libraries contain forum discussions, bolg-posts, user provided URLs, and many other digital artifacts. All of these artifacts have time stamps, most of these artifacts have textual description, and so...
Just as human fingerprints or skin blemishes can be used for forensic purposes, imperfections of digital imaging sensors can serve as unique identifiers in numerous forensic applications, such as matching an image to a specific camera, revealing malicious image manipulation and processing, and determining an approximate age of a digital photograph. There exist several different types of defects...
This paper discusses the results of a survey focusing on the legal issues facing digital forensic experts in the United States. The survey attracted 71 respondents from law enforcement, academia, government, industry and the legal community. It extends the well-known Brungs-Jamieson research on attitudes and priorities of the Australian digital forensic community. The results are compared with ...
Forensic analysis in the context of physical evidence is a relatively mature field. The computerization of society has led to the emergence of digital forensics and now the popularity of cloud computing has sparked interest into cloud forensics. Our goal in this paper is to enable cloud forensics, by using the theory of abstraction layers to describe the purpose and goals of virtual machine (VM...
The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this wor...
The architecture of existing – first generation – computer forensic tools, including the widely used EnCase and FTK products, is rapidly becoming outdated. Tools are not keeping pace with increased complexity and data volumes of modern investigations. This paper discuses the limitations of first generation computer forensic tools. Several metrics for measuring the efficacy and performance of co...
Distributed filesystems provide a cost-effective means of storing high-volume, velocity and variety information in cloud computing, big data and other contemporary systems. These technologies have the potential to be exploited for illegal purposes, which highlights the need for digital forensic investigations. However, there have been few papers published in the area of distributed filesystem f...
Improving employees’ understanding of digital forensic technical terms and concepts within an organisation is likely to increase the potential of successful collaboration during a cyber security incident (e.g. data breach) investigation within that organisation. In this paper, we seek to determine whether multimedia presentations, in this case videos, are an effective tool in improving a learne...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید