Suchergebnisse - "Computer forensic"
-
1
Can computer forensic tools be trusted in digital investigations?
ISSN: 1355-0306, 1876-4452, 1876-4452Veröffentlicht: England Elsevier B.V 01.03.2021Veröffentlicht in Science & justice (01.03.2021)“… •Artefact wiping and Trial obfuscation attacks are not noticed by forensic tools.•Compression bomb kills all tools while as Sparse file spares only …”
Volltext
Journal Article -
2
CURRENT TRENDS IN FORENSIC INFORMATION TECHNOLOGY
ISSN: 1819-2785, 2587-7275Veröffentlicht: Ministry of Justice of the Russian Federation, Russian Federal Centre of Forensic Science 02.04.2018Veröffentlicht in Teoriâ i praktika sudebnoj èkspertizy (02.04.2018)“… The paper presents current trends in computer forensic science, drawing on the outcomes of the 20th annual meeting of the Forensic Information Technology …”
Volltext
Journal Article -
3
Standardization of Terms and Definitions in Computer Forensic Science
ISSN: 1819-2785, 2587-7275Veröffentlicht: Ministry of Justice of the Russian Federation, Russian Federal Centre of Forensic Science 30.12.2017Veröffentlicht in Teoriâ i praktika sudebnoj èkspertizy (30.12.2017)“… The current situation with the use of terms and definitions in the practice of computer forensics is examined. The author argues for the need to develop and …”
Volltext
Journal Article -
4
Сlassification of methods of production of computer forensic by usage approach of graph theory
ISSN: 2074-7128, 2074-7136Veröffentlicht: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.06.2016Veröffentlicht in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.06.2016)“… Сlassification of methods of production of computer forensic by usage approach of graph theory is proposed. If use this classification, it is possible to …”
Volltext
Journal Article -
5
Hadoop‐based analytic framework for cyber forensics
ISSN: 1074-5351, 1099-1131Veröffentlicht: Chichester Wiley Subscription Services, Inc 01.10.2018Veröffentlicht in International journal of communication systems (01.10.2018)“… Summary With an exponential increase in the data size and complexity of various documents to be investigated, existing methods of network forensics are found …”
Volltext
Journal Article -
6
Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework
ISSN: 2158-107X, 2156-5570Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2020Veröffentlicht in International journal of advanced computer science & applications (2020)“… Steganography is one of the anti-forensic techniques used by criminals to hide information in other messages which can cause problems in the investigation …”
Volltext
Journal Article -
7
Testing closed source software: computer forensic tool case study
ISSN: 2263-8733, 2263-8733Veröffentlicht: Paris Springer Paris 01.05.2018Veröffentlicht in Journal of Computer Virology and Hacking Techniques (01.05.2018)“… Computer forensic techniques are important for the prevention, detection, and investigation of electronic crime. Computer forensic investigators need computer …”
Volltext
Journal Article -
8
Towards early software reliability prediction for computer forensic tools (case study)
ISSN: 2193-1801, 2193-1801Veröffentlicht: Cham Springer International Publishing 22.06.2016Veröffentlicht in SpringerPlus (22.06.2016)“… Versatility, flexibility and robustness are essential requirements for software forensic tools. Researchers and practitioners need to put more effort into …”
Volltext
Journal Article -
9
Authorship Identification of Chinese E-Mail Based on Form Features for Computer Forensic
ISBN: 9783038350781, 3038350788ISSN: 1660-9336, 1662-7482, 1662-7482Veröffentlicht: Zurich Trans Tech Publications Ltd 01.04.2014Veröffentlicht in Applied Mechanics and Materials (01.04.2014)“… E-mail has become one of the most important applications on the Internet. At the same time, computer crimes involving e-mail increases rapidly. To prevent …”
Volltext
Journal Article -
10
Digital evidence
ISSN: 0550-2179, 2406-1255Veröffentlicht: University of Novi Sad, Faculty of Law 2012Veröffentlicht in Zbornik radova (Pravni fakultet u Novom Sadu) (2012)“… Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the …”
Volltext
Journal Article -
11
Research on the Architecture Model of Volatile Data Forensics
ISSN: 1877-7058, 1877-7058Veröffentlicht: Elsevier Ltd 2012Veröffentlicht in Procedia engineering (2012)“… This paper proposed a new architecture model of volatile data forensic. The model applied to all the volatile data sources is a general model. It can rebuild …”
Volltext
Journal Article -
12
Current Status and Development Trend of Research of Computer Forensic
ISBN: 9783037859926, 303785992XISSN: 1660-9336, 1662-7482, 1662-7482Veröffentlicht: Zurich Trans Tech Publications Ltd 01.01.2014Veröffentlicht in Applied Mechanics and Materials (01.01.2014)“… With the popularity of computer and network technology, information security problem is increasingly highlighted, and the computer related crime phenomenon …”
Volltext
Journal Article -
13
Enhancing Digital Investigation: The Role of Generative AI (ChatGPT) in Evidence Identification and Analysis in Digital Forensics
ISSN: 2831-3399Veröffentlicht: IEEE 27.05.2025Veröffentlicht in International Conference on Information Technology Research (Online) (27.05.2025)“… Generative Artificial Intelligence (GAI) has garnered considerable attention across disciplines such as science, digital forensics, and literature. Advanced …”
Volltext
Tagungsbericht -
14
Log4shell Investigate Based On Generic Computer Forensic Investigation Model
Veröffentlicht: IEEE 09.05.2023Veröffentlicht in 2023 20th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) (09.05.2023)“… Log 4Shel1 (CVE-2021-44228) Vulnerability was disclosed on November 24, 2021. It is loophole from JAVA application which is a ubiquitous library of Log4j for …”
Volltext
Tagungsbericht -
15
Sample Representativeness Estimation as a Preliminary Stage of Statistical Steganalysis
Veröffentlicht: IEEE 10.11.2021Veröffentlicht in 2021 3rd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA) (10.11.2021)“… The criterion of the test sample representativeness under the condition of a determined reliability and accuracy is described. It based on the proof of the …”
Volltext
Tagungsbericht -
16
Challenges before crime in a digital era: Outsmarting cybercrime offenders – Workshop on Cybercrime, Computer Crime Prevention and the Surveillance Society
ISSN: 2212-473X, 2212-4748Veröffentlicht: Elsevier Ltd 01.04.2011Veröffentlicht in The computer law and security report (01.04.2011)“… On 5 November 2010 within the framework of the Fifth International Conference on Legal, Security and Privacy Issues in IT Law (LSPI) and associated conference …”
Volltext
Journal Article -
17
A criterion for comparing two sets of steganalytical methods with a determined reliability
Veröffentlicht: IEEE 11.11.2020Veröffentlicht in 2020 2nd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA) (11.11.2020)“… The paper is devoted to comparing two sets of steganalytical methods. It is assumed that one of the sets has been studied, i.e. it is known whether the results …”
Volltext
Tagungsbericht -
18
심층신경망을 이용한 소스 코드 원작자 식별
ISSN: 2287-5905Veröffentlicht: 한국정보처리학회 30.09.2019Veröffentlicht in 정보처리학회 논문지 (KTSDE) (30.09.2019)“… 현재 프로그래밍 소스들이 온라인에서 공개되어 있기 때문에 무분별한 표절이나 저작권에 대한 문제가 일어나고 있다. 그 중 반복된 저자가 작성한 소스코드는 프로그래밍 …”
Volltext
Journal Article -
19
Selective deletion of non-relevant data
ISSN: 1742-2876, 1873-202XVeröffentlicht: Elsevier Ltd 01.03.2017Veröffentlicht in Digital investigation (01.03.2017)“… In crime investigation, especially in computer crime investigations, seizure and analysis of digital evidence is a de facto standard procedure. To prevent …”
Volltext
Journal Article -
20
Reduction of Steganalytical Methods Set with Determined Reliability
Veröffentlicht: IEEE 01.11.2019Veröffentlicht in 2019 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA) (01.11.2019)“… The technology that allows to exclude from computing the steganalytical methods based on the same regularities is described. It consists of mathematical model …”
Volltext
Tagungsbericht

