نتایج جستجو برای: forensics

تعداد نتایج: 3917  

2001
Alec Yasinsac Yanet Manzano

– The Internet is growing explosively, as is the number of crimes committed against or using computers. As a response to the growth of computer crime, the field of Computer and Network Forensics emerged. Computer forensics is the art of discovering and retrieving information about a crime in such a way to make it admissible in court. It is after-the-fact in that the only preventative capability...

2007
Simson L. Garfinkel

Research in the field of computer forensics is hobbled by the lack of realistic data. Academics are not developing automated techniques and tools because they lack the raw data necessary to develop and validate algorithms. Investigators that have access to real data operate under legal and practical restraints that prevent the data from being used in research. To make progress, we must “prime t...

2013
Grant Osborne

This document presents an overview of the most common memory forensics techniques used in the acquisition and analysis of a system’s volatile memory. Memory forensics rose from obscurity in 2005 in response to a challenge issued by the Digital Forensics Research Workshop (DFRWS). Since then, investigators and researchers alike have begun to recognise the important role that memory forensics can...

2011
Cui Yimin Jin Qi

This paper presents an implementation technical solution of network forensics system for Chinese text content. The technical solution utilizes Bloom filter algorithm and Chinese word segmentation and metaaggregation algorithm(CWSMA) to preprocess and effectively store contents of the text aiming at technical challenges caused by characteristics of “unpredictability of the event features” and “u...

2003
Christian Johansson

Computer forensics is the use of computer investigation and analysis techniques to identify, examine and preserve electronic information, potentially for this to be used as evidence in a court of law. Anti-forensics is the attempt to reduce the quantity and quality of data gathered by the above mentioned activity. In addition to describing the history and current status of forensics/anti-forens...

2007
Felix C. Freiling Bastian Schwittay

Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents and contain their effects, Incident Response focusses more on restoration of normal service and Computer Forensics on the provision of evidence that can be used in a court of law. In this paper we present a common model...

2005
Johnny Healey

Filesystem forensics is a general term to describe the searching and recovery of data that is on a drive that has been damaged or reformatted. There are two common applications for filesystem forensics, data recovery and criminal investigation. Certain factors in the filesystem design can make forensics difficult. If only the raw blocks exist on the disk, then it can be very difficult to determ...

Journal: :CoRR 2012
M. S. Sreelakshmi D. Venkataraman

A large number of image forensics methods are available which are capable of identifying image tampering. But these techniques are not capable of addressing the anti-forensics method which is able to hide the trace of image tampering. In this paper anti-forensics method for digital image compression has been proposed. This anti-forensics method is capable of removing the traces of image compres...

Journal: :IEEE Transactions on Information Forensics and Security 2012

Journal: :International Journal of Computer Applications 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید