Suchergebnisse - "Computer forensic"

  1. 1

    Can computer forensic tools be trusted in digital investigations? von Bhat, Wasim Ahmad, AlZahrani, Ali, Wani, Mohamad Ahtisham

    ISSN: 1355-0306, 1876-4452, 1876-4452
    Veröffentlicht: England Elsevier B.V 01.03.2021
    Veröffentlicht in Science & justice (01.03.2021)
    “… •Artefact wiping and Trial obfuscation attacks are not noticed by forensic tools.•Compression bomb kills all tools while as Sparse file spares only …”
    Volltext
    Journal Article
  2. 2

    CURRENT TRENDS IN FORENSIC INFORMATION TECHNOLOGY von Khatuntsev, Nikolai A.

    ISSN: 1819-2785, 2587-7275
    Veröffentlicht: Ministry of Justice of the Russian Federation, Russian Federal Centre of Forensic Science 02.04.2018
    Veröffentlicht in Teoriâ i praktika sudebnoj èkspertizy (02.04.2018)
    “… The paper presents current trends in computer forensic  science, drawing on the outcomes of the 20th annual meeting of the Forensic Information Technology …”
    Volltext
    Journal Article
  3. 3

    Standardization of Terms and Definitions in Computer Forensic Science von Khatuntsev, N. A.

    ISSN: 1819-2785, 2587-7275
    Veröffentlicht: Ministry of Justice of the Russian Federation, Russian Federal Centre of Forensic Science 30.12.2017
    Veröffentlicht in Teoriâ i praktika sudebnoj èkspertizy (30.12.2017)
    “… The current situation with the use of terms and definitions in the practice of computer forensics is examined. The author argues for the need to develop and …”
    Volltext
    Journal Article
  4. 4

    Сlassification of methods of production of computer forensic by usage approach of graph theory von Anna Ravilyevna Smolina, Alexander Alexandrovich Shelupanov

    ISSN: 2074-7128, 2074-7136
    Veröffentlicht: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.06.2016
    Veröffentlicht in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.06.2016)
    “… Сlassification of methods of production of computer forensic by usage approach of graph theory is proposed. If use this classification, it is possible to …”
    Volltext
    Journal Article
  5. 5

    Hadoop‐based analytic framework for cyber forensics von Chhabra, Gurpal Singh, Singh, Varinderpal, Singh, Maninder

    ISSN: 1074-5351, 1099-1131
    Veröffentlicht: Chichester Wiley Subscription Services, Inc 01.10.2018
    Veröffentlicht in International journal of communication systems (01.10.2018)
    “… Summary With an exponential increase in the data size and complexity of various documents to be investigated, existing methods of network forensics are found …”
    Volltext
    Journal Article
  6. 6

    Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework von Akbar, Muh. Hajar, -, Sunardi, Riadi, Imam

    ISSN: 2158-107X, 2156-5570
    Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2020
    “… Steganography is one of the anti-forensic techniques used by criminals to hide information in other messages which can cause problems in the investigation …”
    Volltext
    Journal Article
  7. 7

    Testing closed source software: computer forensic tool case study von Talib, Manar Abu

    ISSN: 2263-8733, 2263-8733
    Veröffentlicht: Paris Springer Paris 01.05.2018
    Veröffentlicht in Journal of Computer Virology and Hacking Techniques (01.05.2018)
    “… Computer forensic techniques are important for the prevention, detection, and investigation of electronic crime. Computer forensic investigators need computer …”
    Volltext
    Journal Article
  8. 8

    Towards early software reliability prediction for computer forensic tools (case study) von Abu Talib, Manar

    ISSN: 2193-1801, 2193-1801
    Veröffentlicht: Cham Springer International Publishing 22.06.2016
    Veröffentlicht in SpringerPlus (22.06.2016)
    “… Versatility, flexibility and robustness are essential requirements for software forensic tools. Researchers and practitioners need to put more effort into …”
    Volltext
    Journal Article
  9. 9

    Authorship Identification of Chinese E-Mail Based on Form Features for Computer Forensic von Ma, Jian Bin, Teng, Gui Fa, Chang, Shu Hui

    ISBN: 9783038350781, 3038350788
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Veröffentlicht: Zurich Trans Tech Publications Ltd 01.04.2014
    Veröffentlicht in Applied Mechanics and Materials (01.04.2014)
    “… E-mail has become one of the most important applications on the Internet. At the same time, computer crimes involving e-mail increases rapidly. To prevent …”
    Volltext
    Journal Article
  10. 10

    Digital evidence von Tatjana, Lukic

    ISSN: 0550-2179, 2406-1255
    Veröffentlicht: University of Novi Sad, Faculty of Law 2012
    “… Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the …”
    Volltext
    Journal Article
  11. 11

    Research on the Architecture Model of Volatile Data Forensics von Hu, Liang, Zhang, XiaoLu, Wang, Feng, Wang, WenBo, Zhao, Kuo

    ISSN: 1877-7058, 1877-7058
    Veröffentlicht: Elsevier Ltd 2012
    Veröffentlicht in Procedia engineering (2012)
    “… This paper proposed a new architecture model of volatile data forensic. The model applied to all the volatile data sources is a general model. It can rebuild …”
    Volltext
    Journal Article
  12. 12

    Current Status and Development Trend of Research of Computer Forensic von Fu, Zhong Yong, Zhao, Zhen Zhou

    ISBN: 9783037859926, 303785992X
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Veröffentlicht: Zurich Trans Tech Publications Ltd 01.01.2014
    Veröffentlicht in Applied Mechanics and Materials (01.01.2014)
    “… With the popularity of computer and network technology, information security problem is increasingly highlighted, and the computer related crime phenomenon …”
    Volltext
    Journal Article
  13. 13

    Enhancing Digital Investigation: The Role of Generative AI (ChatGPT) in Evidence Identification and Analysis in Digital Forensics von Hawa, Marah Radi, Owda, Majdi, Owda, Amani Yousef

    ISSN: 2831-3399
    Veröffentlicht: IEEE 27.05.2025
    “… Generative Artificial Intelligence (GAI) has garnered considerable attention across disciplines such as science, digital forensics, and literature. Advanced …”
    Volltext
    Tagungsbericht
  14. 14

    Log4shell Investigate Based On Generic Computer Forensic Investigation Model von Changsan, Ukid, Boonyopakorn, Pongsarun

    Veröffentlicht: IEEE 09.05.2023
    “… Log 4Shel1 (CVE-2021-44228) Vulnerability was disclosed on November 24, 2021. It is loophole from JAVA application which is a ubiquitous library of Log4j for …”
    Volltext
    Tagungsbericht
  15. 15

    Sample Representativeness Estimation as a Preliminary Stage of Statistical Steganalysis von Atlasov, Igor, Solodukha, Roman

    Veröffentlicht: IEEE 10.11.2021
    “… The criterion of the test sample representativeness under the condition of a determined reliability and accuracy is described. It based on the proof of the …”
    Volltext
    Tagungsbericht
  16. 16

    Challenges before crime in a digital era: Outsmarting cybercrime offenders – Workshop on Cybercrime, Computer Crime Prevention and the Surveillance Society von Agustina, José R., Insa, Fredesvinda

    ISSN: 2212-473X, 2212-4748
    Veröffentlicht: Elsevier Ltd 01.04.2011
    Veröffentlicht in The computer law and security report (01.04.2011)
    “… On 5 November 2010 within the framework of the Fifth International Conference on Legal, Security and Privacy Issues in IT Law (LSPI) and associated conference …”
    Volltext
    Journal Article
  17. 17

    A criterion for comparing two sets of steganalytical methods with a determined reliability von Atlasov, Igor, Solodukha, Roman

    Veröffentlicht: IEEE 11.11.2020
    “… The paper is devoted to comparing two sets of steganalytical methods. It is assumed that one of the sets has been studied, i.e. it is known whether the results …”
    Volltext
    Tagungsbericht
  18. 18

    심층신경망을 이용한 소스 코드 원작자 식별 von 임지수, Jisu Rhim, Tamer Abuhmed

    ISSN: 2287-5905
    Veröffentlicht: 한국정보처리학회 30.09.2019
    Veröffentlicht in 정보처리학회 논문지 (KTSDE) (30.09.2019)
    “… 현재 프로그래밍 소스들이 온라인에서 공개되어 있기 때문에 무분별한 표절이나 저작권에 대한 문제가 일어나고 있다. 그 중 반복된 저자가 작성한 소스코드는 프로그래밍 …”
    Volltext
    Journal Article
  19. 19

    Selective deletion of non-relevant data von Zoubek, Christian, Sack, Konstantin

    ISSN: 1742-2876, 1873-202X
    Veröffentlicht: Elsevier Ltd 01.03.2017
    Veröffentlicht in Digital investigation (01.03.2017)
    “… In crime investigation, especially in computer crime investigations, seizure and analysis of digital evidence is a de facto standard procedure. To prevent …”
    Volltext
    Journal Article
  20. 20

    Reduction of Steganalytical Methods Set with Determined Reliability von Atlasov, Igor, Solodukha, Roman

    Veröffentlicht: IEEE 01.11.2019
    “… The technology that allows to exclude from computing the steganalytical methods based on the same regularities is described. It consists of mathematical model …”
    Volltext
    Tagungsbericht