Search Results - Computer forensic timeline
-
1
Authors:
Source: Digital Investigation. The International Journal of Digital Forensics and Incident Response. 6(Supplement 1):78-87
Subject Terms: Computer forensic timeline, Event visualization, E-fraud, Timestamp, Chronological evidence, Time Variable, Time determination
File Description: electronic
-
2
Authors:
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2505.03100
-
3
Authors: et al.
Source: SoftwareX, Vol 20, Iss , Pp 101255- (2022)
Subject Terms: Drone forensics, Forensic timeline, Autopsy, Log2timeline, Computer software, QA76.75-76.765
File Description: electronic resource
-
4
Authors:
Source: Computers, Vol 14, Iss 2, p 67 (2025)
Subject Terms: digital forensics, incident response, DFIR, timeline analysis, cyber incident, GenAI, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
5
Authors: et al.
Source: 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE). :1-8
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 16. Peace & justice
-
6
Authors:
Source: Computers, Vol 14, Iss 2, p 67 (2025)
Subject Terms: FOS: Computer and information sciences, Cryptography and Security, DFIR, digital forensics, GenAI, QA75.5-76.95, Machine Learning (cs.LG), cyber incident, Machine Learning, Artificial Intelligence (cs.AI), Emerging Technologies (cs.ET), Artificial Intelligence, Electronic computers. Computer science, incident response, timeline analysis, Cryptography and Security (cs.CR), Emerging Technologies
-
7
Authors:
Source: Computers (2073-431X); Feb2025, Vol. 14 Issue 2, p67, 42p
-
8
Authors: et al.
Source: IEEE Access, Vol 10, Pp 35172-35218 (2022)
IEEE AccessSubject Terms: Mobile computing, Software engineering, Digital forensic science, digital forensics, 02 engineering and technology, TK1-9971, Memory forensics, Smartphones, Computer crimes, incident response, 0202 electrical engineering, electronic engineering, information engineering, forensic timelines, android security, Electrical engineering. Electronics. Nuclear engineering
-
9
Authors:
Resource Type: eBook.
Categories: COMPUTERS / Security / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Image Processing, COMPUTERS / Artificial Intelligence / Computer Vision & Pattern Recognition, COMPUTERS / Interactive & Multimedia, MATHEMATICS / Probability & Statistics / General
PDF Full Text ePub Full Text -
10
Authors: Hudan Studiawan
Source: Communications in Computer and Information Science ISBN: 9783031626234
-
11
Authors:
Subject Terms: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Emerging Technologies (cs.ET), Computer Science - Artificial Intelligence, Computer Science - Emerging Technologies, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2409.02572
-
12
Authors: Joy, Dany
-
13
Authors:
Contributors:
Source: Proceedings of Legal AIIA Workshop (ICAIL ’19).
Subject Terms: forensisch onderzoek, digitale techniek, computercriminaliteit, kunstmatige intelligentie (artificial intelligence (ai))
-
14
Authors: et al.
Source: Al Fahdi, M, Clarke, N L, Li, F & Furnell, S M 2016, ' A suspect-oriented intelligent and automated computer forensic analysis ', Digital Investigation, vol. 18, pp. 65-76 . https://doi.org/10.1016/j.diin.2016.08.001
Subject Terms: digital forensics, self-organising map, 02 engineering and technology, SOM, 16. Peace & justice, Computer Science Applications, Medical Laboratory Technology, cybercrime, 0202 electrical engineering, electronic engineering, information engineering, Law, automation, clustering
File Description:
PDF ; application/pdfAccess URL: https://nottingham-repository.worktribe.com/preview/4902507/A_Suspect-Oriented_Intelligent_26_Automated_Computer_Forensic_Analysis.pdf
https://dblp.uni-trier.de/db/journals/di/di18.html#FahdiCLF16
https://ro.ecu.edu.au/ecuworkspost2013/2249/
https://researchportal.port.ac.uk/portal/en/publications/a-suspectoriented-intelligent-and-automated-computer -forensic -analysis(9791fb98-dcd5-4a1f-8d81-fc359b6982f4).html
https://researchportal.port.ac.uk/portal/files/8187530/A_Suspect_Oriented_Intelligent_Automated_Computer_Forensic_Analysis.pdf
https://pearl.plymouth.ac.uk/handle/10026.1/6714
https://dl.acm.org/doi/10.1016/j.diin.2016.08.001
https://researchportal.port.ac.uk/portal/en/publications/a-suspectoriented-intelligent-and-automated-computer -forensic -analysis(9791fb98-dcd5-4a1f-8d81-fc359b6982f4).html -
15
Authors: et al.
Source: Wiley Interdisciplinary Reviews: Forensic Science; Mar/Apr2021, Vol. 3 Issue 2, p1-8, 8p
-
16
Authors: et al.
Source: 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE); 2013, p1-8, 8p
-
17
Authors: Sikos, Leslie F.
Source: Wiley Interdisciplinary Reviews: Forensic Science; May/Jun2021, Vol. 3 Issue 3, p1-11, 11p
-
18
Authors:
Source: Frontiers in Health Informatics; 2024, Vol. 13 Issue 8, p5334-5342, 9p
Subject Terms: DIGITAL forensics, CRIMINAL investigation, DATA recovery, CORPORATE governance, CYBERTERRORISM
-
19
Authors:
Source: Digital Investigation. Sep2007, Vol. 4 Issue 3/4, p146-157. 12p.
-
20
Full Text Finder
Nájsť tento článok vo Web of Science