نتایج جستجو برای: digital forensic artifacts

تعداد نتایج: 354431  

2016
Mohamed T. Abdelazim Nashwa AbdelBaki Ahmed F. Shosha

Smart cards are fundamental technology in modern life. It is embedded in numerous devices such as GPS devices, ATM cards, Mobile SIM cards and many others. Mobile devices became the evolution of technology. It becomes smaller, faster and supports large storage capabilities. Digital forensics of mobile devices that maybe found in crime scene is becoming inevitable. The purpose of this research i...

2013
Kam Woods Alexandra Chassanoff Christopher A. Lee

In this paper we present ongoing work conducted as part of the BitCurator project to develop extensible strategies for transforming and incorporating digital forensics metadata into archival metadata schemas. We focus on metadata produced by open-source tools that support Digital Forensics XML (DFXML). We describe how portions of this metadata can be used when recording PREMIS events to describ...

2010
Mark Pollitt

The field of digital forensics is relatively new. While its history may be chronologically short, it is complex. This paper outlines the early history of digital forensics from the perspective of an early participant. The history is divided into four epochs: pre-history, infancy, childhood and adolescence. Each of these epochs is examined from the perspective of the people involved, the crimina...

2010
Simson Garfinkel Simson L. Garfinkel

Today’s Golden Age of computer forensics is quickly coming to an end. Without a clear strategy for enabling research efforts that build upon one another, forensic research will fall behind the market, tools will become increasingly obsolete, and law enforcement, military and other users of computer forensics products will be unable to rely on the results of forensic analysis. This article summa...

2014

Software forensic experts are called upon not only to perform authorship analysis and software copyright infringement forensics but also to perform software quality forensics. Because the prime evidence in such cases also are digital (in the form of software, databases etc.), the judiciary too often engages software forensic practitioners as expert witnesses to arrive at a considered judgment. ...

Journal: :World Scientific series in digital forensics and cybersecurity 2023

In the prevailing convergence of traditional infrastructure-based deployment (i.e., Telco and industry operational networks) towards evolving deployments enabled by 5G virtualization, there is a keen interest in elaborating effective security controls to protect these in-depth. By considering key enabling technologies like networks are democratized, facilitating establishment point presences in...

2016
Varsha Karbhari Sanap Ramrao Adik Vanita Mane

The cyber crimes such as online banking fraud, credit card theft, child pornography, intellectual property theft, identity theft, unauthorized intrusion, money laundering, digital piracy etc. are growing rapidly with technology. Desktops, smartphones, laptops, digital cameras, GPS devices and even watches all can be used to aid a fraud. All this devices leave behind a digital footprint. Gatheri...

Journal: :CoRR 2016
David Lillis Brett Becker Tadhg O'Sullivan Mark Scanlon

Given the ever-increasing prevalence of technology in modern life, there is a corresponding increase in the likelihood of digital devices being pertinent to a criminal investigation or civil litigation. As a direct consequence, the number of investigations requiring digital forensic expertise is resulting in huge digital evidence backlogs being encountered by law enforcement agencies throughout...

Journal: :JDFSL 2014
Joshua James

This work examines the problem of case prioritization in digital investigations for better utilization of limited criminal investigation resources. Current methods of case prioritization, as well as observed prioritization methods used in digital forensic investigation laboratories are examined. After, a multi-stakeholder approach to case prioritization is given that may help reduce reputationa...

Journal: :Digital Investigation 2006
Andy Johnston Jessica Reust

As new legislation is written mandating notification of affected parties following the compromise of confidential data, reliable investigative procedures into unauthorized access of such data assume increasing importance. The increasing costs and penalties associated with exposure of sensitive data can be mitigated through forensic preparation and the ability to employ digital forensics. A case...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید