نتایج جستجو برای: forensics

تعداد نتایج: 3917  

2012
Rainer Böhme Matthias Kirchner H. T. Sencar

This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of forensic analyses. Counter-forensics is first defined in a formal decis...

2017
Yudi Prayudi Imam Riadi

Integrated Digital Forensics Investigation Framework (IDFIF) is a method of investigation of a general nature. IDFIF evolved into IDFIF version 2 that is a method of treatment focuses on smartphones. IDFIF v2 can not be applied to network investigation it is necessary to develop a version 3 IDFIF focused on network forensics. This research is the development of network forensics framework using...

2016

Introduction NIST�s Information Technology Laboratory has two ongoing research projects in computer forensics: the National Software Reference Library (NSRL) project and the Computer Forensics Tool Testing (CFTT) project. Funded through NIST�s Office of Law Enforcement Standards (OLES) by the National Institute of Justice (NIJ), the Federal Bureau of Investigation (FBI), the Department of Defen...

2012
Oluwasola Mary Adedayo Martin S. Olivier

The increasing usage of databases in the storage of critical and sensitive information in many organizations has led to an increase in the rate at which databases are exploited in computer crimes. Databases are often manipulated to facilitate crimes and as such are usually of interest during many investigations as useful information relevant to the investigation can be found therein. A branch o...

2006
Nicole Beebe Jan Guynes Clark

Digital forensics course offerings are being added to various curricula at colleges and universities world-wide at an amazing pace. This is due to significant student interest in the topic and job market demands for such skill sets. However, academia is struggling to establish a firm knowledge base and offer quality digital forensics education to its students. We contend that the identification...

2014
Shams Zawoad

The rapid migration from traditional computing and storage model to the cloud model creates the necessity of supporting reliable forensics in the cloud. However, today’s cloud computing architectures often lack support for forensic investigations because many of the assumptions that are taken for granted in traditional digital forensics do not apply to clouds. Hence, the existing digital forens...

Journal: :Digital Investigation 2017
Andrew Case Golden G. Richard

Traditionally, digital forensics focused on artifacts located on the storage devices of computer systems, mobile phones, digital cameras, and other electronic devices. In the past decade, however, researchers have created a number of powerful memory forensics tools that expand the scope of digital forensics to include the examination of volatile memory as well. While memory forensic techniques ...

2011
Kailash Kumar Sanjeev Sofat Naveen Aggarwal

The dramatic increase in crime relating to the Internet and computers has caused a growing need for computer forensics. Computer forensic tools have been developed to assist computer forensic investigators in conducting a proper investigation into digital crimes. Digital forensics is a growing and important fields of research for current intelligence, law enforcement, and military organizations...

Journal: :Future Internet 2014
Alastair Irons Harjinder Singh Lallie

In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of d...

2016
Surbhi Gupta Parvinder Singh Sandhu

-With the advancement in information technology and image processing software the manipulation of the images has increased considerably from past few decades. Retouching or tampering of the images has been so prevalent that nowadays one can hardly believe their originality. Image authenticity is done using forgery detection techniques. These methods are broadly classified as active and passive....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید