Sciweavers

173 search results - page 4 / 35
» Computer Forensics in Forensis
Sort
View
119
Voted
ICHIT
2009
Springer
15 years 16 days ago
Design and implementation of a live-analysis digital forensic system
As the popularity of the internet continues growing, not only change our life, but also change the way of crime. Number of crime by computer as tools, place or target, cases of su...
Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn
189
Voted
SADFE
2007
IEEE
15 years 9 months ago
Toward Models for Forensic Analysis
The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a m...
Sean Peisert, Matt Bishop, Sidney Karin, Keith Mar...
110
Voted
IMF
2007
15 years 4 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
118
Voted
IMF
2007
15 years 4 months ago
Taxonomy of Anti-Computer Forensics Threats
Joseph C. Sremack, Alexandre V. Antonov