Výsledky vyhledávání - "Computer Forensic"

Upřesnit hledání
  1. 1

    Can computer forensic tools be trusted in digital investigations? Autor Bhat, Wasim Ahmad, AlZahrani, Ali, Wani, Mohamad Ahtisham

    ISSN: 1355-0306, 1876-4452, 1876-4452
    Vydáno: England Elsevier B.V 01.03.2021
    Vydáno v Science & justice (01.03.2021)
    “…•Artefact wiping and Trial obfuscation attacks are not noticed by forensic tools.•Compression bomb kills all tools while as Sparse file spares only…”
    Získat plný text
    Journal Article
  2. 2

    CURRENT TRENDS IN FORENSIC INFORMATION TECHNOLOGY Autor Khatuntsev, Nikolai A.

    ISSN: 1819-2785, 2587-7275
    Vydáno: Ministry of Justice of the Russian Federation, Russian Federal Centre of Forensic Science 02.04.2018
    “…The paper presents current trends in computer forensic  science, drawing on the outcomes of the 20th annual meeting of the Forensic Information Technology…”
    Získat plný text
    Journal Article
  3. 3

    Standardization of Terms and Definitions in Computer Forensic Science Autor Khatuntsev, N. A.

    ISSN: 1819-2785, 2587-7275
    Vydáno: Ministry of Justice of the Russian Federation, Russian Federal Centre of Forensic Science 30.12.2017
    “…The current situation with the use of terms and definitions in the practice of computer forensics is examined. The author argues for the need to develop and…”
    Získat plný text
    Journal Article
  4. 4

    Сlassification of methods of production of computer forensic by usage approach of graph theory Autor Anna Ravilyevna Smolina, Alexander Alexandrovich Shelupanov

    ISSN: 2074-7128, 2074-7136
    Vydáno: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.06.2016
    “…Сlassification of methods of production of computer forensic by usage approach of graph theory is proposed. If use this classification, it is possible to…”
    Získat plný text
    Journal Article
  5. 5

    Hadoop‐based analytic framework for cyber forensics Autor Chhabra, Gurpal Singh, Singh, Varinderpal, Singh, Maninder

    ISSN: 1074-5351, 1099-1131
    Vydáno: Chichester Wiley Subscription Services, Inc 01.10.2018
    “…Summary With an exponential increase in the data size and complexity of various documents to be investigated, existing methods of network forensics are found…”
    Získat plný text
    Journal Article
  6. 6

    Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework Autor Akbar, Muh. Hajar, -, Sunardi, Riadi, Imam

    ISSN: 2158-107X, 2156-5570
    Vydáno: West Yorkshire Science and Information (SAI) Organization Limited 2020
    “…Steganography is one of the anti-forensic techniques used by criminals to hide information in other messages which can cause problems in the investigation…”
    Získat plný text
    Journal Article
  7. 7

    Testing closed source software: computer forensic tool case study Autor Talib, Manar Abu

    ISSN: 2263-8733, 2263-8733
    Vydáno: Paris Springer Paris 01.05.2018
    “…Computer forensic techniques are important for the prevention, detection, and investigation of electronic crime. Computer forensic investigators need computer…”
    Získat plný text
    Journal Article
  8. 8

    Towards early software reliability prediction for computer forensic tools (case study) Autor Abu Talib, Manar

    ISSN: 2193-1801, 2193-1801
    Vydáno: Cham Springer International Publishing 22.06.2016
    Vydáno v SpringerPlus (22.06.2016)
    “…Versatility, flexibility and robustness are essential requirements for software forensic tools. Researchers and practitioners need to put more effort into…”
    Získat plný text
    Journal Article
  9. 9

    Authorship Identification of Chinese E-Mail Based on Form Features for Computer Forensic Autor Ma, Jian Bin, Teng, Gui Fa, Chang, Shu Hui

    ISBN: 9783038350781, 3038350788
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Vydáno: Zurich Trans Tech Publications Ltd 01.04.2014
    Vydáno v Applied Mechanics and Materials (01.04.2014)
    “…E-mail has become one of the most important applications on the Internet. At the same time, computer crimes involving e-mail increases rapidly. To prevent…”
    Získat plný text
    Journal Article
  10. 10

    Digital evidence Autor Tatjana, Lukic

    ISSN: 0550-2179, 2406-1255
    Vydáno: University of Novi Sad, Faculty of Law 2012
    “…Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the…”
    Získat plný text
    Journal Article
  11. 11

    Research on the Architecture Model of Volatile Data Forensics Autor Hu, Liang, Zhang, XiaoLu, Wang, Feng, Wang, WenBo, Zhao, Kuo

    ISSN: 1877-7058, 1877-7058
    Vydáno: Elsevier Ltd 2012
    Vydáno v Procedia engineering (2012)
    “…This paper proposed a new architecture model of volatile data forensic. The model applied to all the volatile data sources is a general model. It can rebuild…”
    Získat plný text
    Journal Article
  12. 12

    Current Status and Development Trend of Research of Computer Forensic Autor Fu, Zhong Yong, Zhao, Zhen Zhou

    ISBN: 9783037859926, 303785992X
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Vydáno: Zurich Trans Tech Publications Ltd 01.01.2014
    Vydáno v Applied Mechanics and Materials (01.01.2014)
    “…With the popularity of computer and network technology, information security problem is increasingly highlighted, and the computer related crime phenomenon…”
    Získat plný text
    Journal Article
  13. 13

    Enhancing Digital Investigation: The Role of Generative AI (ChatGPT) in Evidence Identification and Analysis in Digital Forensics Autor Hawa, Marah Radi, Owda, Majdi, Owda, Amani Yousef

    ISSN: 2831-3399
    Vydáno: IEEE 27.05.2025
    “…Generative Artificial Intelligence (GAI) has garnered considerable attention across disciplines such as science, digital forensics, and literature. Advanced…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    Log4shell Investigate Based On Generic Computer Forensic Investigation Model Autor Changsan, Ukid, Boonyopakorn, Pongsarun

    Vydáno: IEEE 09.05.2023
    “…Log 4Shel1 (CVE-2021-44228) Vulnerability was disclosed on November 24, 2021. It is loophole from JAVA application which is a ubiquitous library of Log4j for…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    Sample Representativeness Estimation as a Preliminary Stage of Statistical Steganalysis Autor Atlasov, Igor, Solodukha, Roman

    Vydáno: IEEE 10.11.2021
    “…The criterion of the test sample representativeness under the condition of a determined reliability and accuracy is described. It based on the proof of the…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    Challenges before crime in a digital era: Outsmarting cybercrime offenders – Workshop on Cybercrime, Computer Crime Prevention and the Surveillance Society Autor Agustina, José R., Insa, Fredesvinda

    ISSN: 2212-473X, 2212-4748
    Vydáno: Elsevier Ltd 01.04.2011
    Vydáno v The computer law and security report (01.04.2011)
    “…On 5 November 2010 within the framework of the Fifth International Conference on Legal, Security and Privacy Issues in IT Law (LSPI) and associated conference…”
    Získat plný text
    Journal Article
  17. 17

    A criterion for comparing two sets of steganalytical methods with a determined reliability Autor Atlasov, Igor, Solodukha, Roman

    Vydáno: IEEE 11.11.2020
    “…The paper is devoted to comparing two sets of steganalytical methods. It is assumed that one of the sets has been studied, i.e. it is known whether the results…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    심층신경망을 이용한 소스 코드 원작자 식별 Autor 임지수, Jisu Rhim, Tamer Abuhmed

    ISSN: 2287-5905
    Vydáno: 한국정보처리학회 30.09.2019
    Vydáno v 정보처리학회 논문지 (KTSDE) (30.09.2019)
    “…현재 프로그래밍 소스들이 온라인에서 공개되어 있기 때문에 무분별한 표절이나 저작권에 대한 문제가 일어나고 있다. 그 중 반복된 저자가 작성한 소스코드는 프로그래밍…”
    Získat plný text
    Journal Article
  19. 19

    Selective deletion of non-relevant data Autor Zoubek, Christian, Sack, Konstantin

    ISSN: 1742-2876, 1873-202X
    Vydáno: Elsevier Ltd 01.03.2017
    Vydáno v Digital investigation (01.03.2017)
    “…In crime investigation, especially in computer crime investigations, seizure and analysis of digital evidence is a de facto standard procedure. To prevent…”
    Získat plný text
    Journal Article
  20. 20

    Reduction of Steganalytical Methods Set with Determined Reliability Autor Atlasov, Igor, Solodukha, Roman

    Vydáno: IEEE 01.11.2019
    “…The technology that allows to exclude from computing the steganalytical methods based on the same regularities is described. It consists of mathematical model…”
    Získat plný text
    Konferenční příspěvek