نتایج جستجو برای: digital evidence
تعداد نتایج: 1113651 فیلتر نتایج به سال:
Chain of custody of digital evidence in digital forensic field are today essential part of digital investigation process. In order the evidence to be accepted by the court as valid, chain of custody for digital evidence must be kept, or it must be known who exactly, when, where, why and how came into contact with evidence in each stage of the digital investigations process. This paper deals wit...
How Much Bone Cement Is Utilized for Component Fixation in Primary Cemented Total Knee Arthroplasty?
Background: No scientific evidence exists regarding the amount of bone cement used and discarded in primarycemented Total knee arthroplasty (TKA). The aim of this study was to identify the exact amount of bone cement utilizedfor component fixation in primary TKA.Methods: In a prospective study carried out at five centers, 133 primary cemented TKAs were performed. One packof 40g Palacos bone cem...
Chain of custody is the procedure to do a chronological documentation of evidence, and it is an important procedure in the investigation process. Both physical and digital evidence is an important part in the process of investigation and courtroom. However, handling the chain of custody for digital evidence is more difficult than the handling of physical evidence. Nevertheless, the handling of ...
This paper analyzes state and local law enforcement agents’ perceptions about prosecutors’ knowledge of digital evidence and their willingness to prosecute cases involving digital evidence, and agents’ perceptions about judges’ knowledge of digital evidence and their willingness to admit digital evidence in legal proceedings. Statistical analysis indicates that a significant negative correlatio...
Digital forensic evidence consists of exhibits, each consisting of a sequence of bits, presented by witnesses in a legal matter, to help jurors establish the facts of the case and support or refute legal theories of the case. The exhibits should be introduced and presented and/or challenged by properly qualified people using a properly applied methodology that addresses the legal theories at is...
The degree of the reliability, integrity, and availability of information in organizations can determine the credibility of the organization. As people and applications generate information, the information is stored in various places. It is vital for the organization to know where information is stored, what format it is, and how to access it. Not all information will be evidence but it is ess...
The Autopsy Forensics Browser is a graphical interface to The Sleuth Kit (TASK). Autopsy is a free and open Source Windows-based digital forensics platform for diagnose an event. It is capable of analysing disk images, local drives and directories in order to determine possible causes of an event in a read-only environment. It was designed to be an extensible platform so that it can be an end-t...
We present EviCheck, a tool for the verification, certification and generation of lightweight fine-grained security policies for Android. It applies static analysis to check the conformance between an application and a given policy. A distinguishing feature of EviCheck is its ability to generate digital evidence: a certificate for the analysis algorithm asserting the conformance between the app...
Over the past decade or so, well-understood procedures and methodologies have evolved within computer forensics digital evidence collection that emphasized disk imaging procedures. In their paper Risk Sensitive Digital Evidence Collection [3], the authors posit that the current methodology which focuses on collecting entire bit-stream images of original evidence disk could increase legal and fi...
Cloud forensics analyzes digital evidence obtained from cloud computing environments. In the cloud, the traditional forensic focus of acquiring and analyzing snapshots of digital artifacts will becomes significantly less relevant as many of the artifacts are ephemeral, while the history of state changes become pervasive. This, over the medium-to-long term, the task of forensically reconstructin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید