Výsledky vyhledávání - "Computer Forensic"
-
1
Can computer forensic tools be trusted in digital investigations?
ISSN: 1355-0306, 1876-4452, 1876-4452Vydáno: England Elsevier B.V 01.03.2021Vydáno v Science & justice (01.03.2021)“…•Artefact wiping and Trial obfuscation attacks are not noticed by forensic tools.•Compression bomb kills all tools while as Sparse file spares only…”
Získat plný text
Journal Article -
2
CURRENT TRENDS IN FORENSIC INFORMATION TECHNOLOGY
ISSN: 1819-2785, 2587-7275Vydáno: Ministry of Justice of the Russian Federation, Russian Federal Centre of Forensic Science 02.04.2018Vydáno v Teoriâ i praktika sudebnoj èkspertizy (02.04.2018)“…The paper presents current trends in computer forensic science, drawing on the outcomes of the 20th annual meeting of the Forensic Information Technology…”
Získat plný text
Journal Article -
3
Standardization of Terms and Definitions in Computer Forensic Science
ISSN: 1819-2785, 2587-7275Vydáno: Ministry of Justice of the Russian Federation, Russian Federal Centre of Forensic Science 30.12.2017Vydáno v Teoriâ i praktika sudebnoj èkspertizy (30.12.2017)“…The current situation with the use of terms and definitions in the practice of computer forensics is examined. The author argues for the need to develop and…”
Získat plný text
Journal Article -
4
Сlassification of methods of production of computer forensic by usage approach of graph theory
ISSN: 2074-7128, 2074-7136Vydáno: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.06.2016Vydáno v Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.06.2016)“…Сlassification of methods of production of computer forensic by usage approach of graph theory is proposed. If use this classification, it is possible to…”
Získat plný text
Journal Article -
5
Hadoop‐based analytic framework for cyber forensics
ISSN: 1074-5351, 1099-1131Vydáno: Chichester Wiley Subscription Services, Inc 01.10.2018Vydáno v International journal of communication systems (01.10.2018)“…Summary With an exponential increase in the data size and complexity of various documents to be investigated, existing methods of network forensics are found…”
Získat plný text
Journal Article -
6
Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework
ISSN: 2158-107X, 2156-5570“…Steganography is one of the anti-forensic techniques used by criminals to hide information in other messages which can cause problems in the investigation…”Vydáno: West Yorkshire Science and Information (SAI) Organization Limited 2020
Získat plný text
Journal Article -
7
Testing closed source software: computer forensic tool case study
ISSN: 2263-8733, 2263-8733Vydáno: Paris Springer Paris 01.05.2018Vydáno v Journal of Computer Virology and Hacking Techniques (01.05.2018)“…Computer forensic techniques are important for the prevention, detection, and investigation of electronic crime. Computer forensic investigators need computer…”
Získat plný text
Journal Article -
8
Towards early software reliability prediction for computer forensic tools (case study)
ISSN: 2193-1801, 2193-1801Vydáno: Cham Springer International Publishing 22.06.2016Vydáno v SpringerPlus (22.06.2016)“…Versatility, flexibility and robustness are essential requirements for software forensic tools. Researchers and practitioners need to put more effort into…”
Získat plný text
Journal Article -
9
Authorship Identification of Chinese E-Mail Based on Form Features for Computer Forensic
ISBN: 9783038350781, 3038350788ISSN: 1660-9336, 1662-7482, 1662-7482Vydáno: Zurich Trans Tech Publications Ltd 01.04.2014Vydáno v Applied Mechanics and Materials (01.04.2014)“…E-mail has become one of the most important applications on the Internet. At the same time, computer crimes involving e-mail increases rapidly. To prevent…”
Získat plný text
Journal Article -
10
Digital evidence
ISSN: 0550-2179, 2406-1255Vydáno: University of Novi Sad, Faculty of Law 2012Vydáno v Zbornik radova (Pravni fakultet u Novom Sadu) (2012)“…Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the…”
Získat plný text
Journal Article -
11
Research on the Architecture Model of Volatile Data Forensics
ISSN: 1877-7058, 1877-7058Vydáno: Elsevier Ltd 2012Vydáno v Procedia engineering (2012)“…This paper proposed a new architecture model of volatile data forensic. The model applied to all the volatile data sources is a general model. It can rebuild…”
Získat plný text
Journal Article -
12
Current Status and Development Trend of Research of Computer Forensic
ISBN: 9783037859926, 303785992XISSN: 1660-9336, 1662-7482, 1662-7482Vydáno: Zurich Trans Tech Publications Ltd 01.01.2014Vydáno v Applied Mechanics and Materials (01.01.2014)“…With the popularity of computer and network technology, information security problem is increasingly highlighted, and the computer related crime phenomenon…”
Získat plný text
Journal Article -
13
Enhancing Digital Investigation: The Role of Generative AI (ChatGPT) in Evidence Identification and Analysis in Digital Forensics
ISSN: 2831-3399Vydáno: IEEE 27.05.2025Vydáno v International Conference on Information Technology Research (Online) (27.05.2025)“…Generative Artificial Intelligence (GAI) has garnered considerable attention across disciplines such as science, digital forensics, and literature. Advanced…”
Získat plný text
Konferenční příspěvek -
14
Log4shell Investigate Based On Generic Computer Forensic Investigation Model
Vydáno: IEEE 09.05.2023Vydáno v 2023 20th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) (09.05.2023)“…Log 4Shel1 (CVE-2021-44228) Vulnerability was disclosed on November 24, 2021. It is loophole from JAVA application which is a ubiquitous library of Log4j for…”
Získat plný text
Konferenční příspěvek -
15
Sample Representativeness Estimation as a Preliminary Stage of Statistical Steganalysis
Vydáno: IEEE 10.11.2021Vydáno v 2021 3rd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA) (10.11.2021)“…The criterion of the test sample representativeness under the condition of a determined reliability and accuracy is described. It based on the proof of the…”
Získat plný text
Konferenční příspěvek -
16
Challenges before crime in a digital era: Outsmarting cybercrime offenders – Workshop on Cybercrime, Computer Crime Prevention and the Surveillance Society
ISSN: 2212-473X, 2212-4748Vydáno: Elsevier Ltd 01.04.2011Vydáno v The computer law and security report (01.04.2011)“…On 5 November 2010 within the framework of the Fifth International Conference on Legal, Security and Privacy Issues in IT Law (LSPI) and associated conference…”
Získat plný text
Journal Article -
17
A criterion for comparing two sets of steganalytical methods with a determined reliability
Vydáno: IEEE 11.11.2020Vydáno v 2020 2nd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA) (11.11.2020)“…The paper is devoted to comparing two sets of steganalytical methods. It is assumed that one of the sets has been studied, i.e. it is known whether the results…”
Získat plný text
Konferenční příspěvek -
18
심층신경망을 이용한 소스 코드 원작자 식별
ISSN: 2287-5905Vydáno: 한국정보처리학회 30.09.2019Vydáno v 정보처리학회 논문지 (KTSDE) (30.09.2019)“…현재 프로그래밍 소스들이 온라인에서 공개되어 있기 때문에 무분별한 표절이나 저작권에 대한 문제가 일어나고 있다. 그 중 반복된 저자가 작성한 소스코드는 프로그래밍…”
Získat plný text
Journal Article -
19
Selective deletion of non-relevant data
ISSN: 1742-2876, 1873-202XVydáno: Elsevier Ltd 01.03.2017Vydáno v Digital investigation (01.03.2017)“…In crime investigation, especially in computer crime investigations, seizure and analysis of digital evidence is a de facto standard procedure. To prevent…”
Získat plný text
Journal Article -
20
Reduction of Steganalytical Methods Set with Determined Reliability
Vydáno: IEEE 01.11.2019Vydáno v 2019 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA) (01.11.2019)“…The technology that allows to exclude from computing the steganalytical methods based on the same regularities is described. It consists of mathematical model…”
Získat plný text
Konferenční příspěvek

