Sciweavers

561 search results - page 3 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
ICHIT
2009
Springer
13 years 7 months ago
Design and implementation of a live-analysis digital forensic system
As the popularity of the internet continues growing, not only change our life, but also change the way of crime. Number of crime by computer as tools, place or target, cases of su...
Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn
SAC
2011
ACM
13 years 18 days ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...
AUSFORENSICS
2004
13 years 11 months ago
Towards Identifying Criteria for the Evidential Weight of System Event Logs
Despite the widespread use of computing in almost all functions of contemporary society and the consequently large number of forensic investigations where computing has been invol...
A. Ahmad, Anthonie B. Ruighaver
IRI
2006
IEEE
14 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
14 years 4 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...