Sciweavers

173 search results - page 4 / 35
» Computer Forensics in Forensis
Sort
View
ICHIT
2009
Springer
13 years 6 months ago
Design and implementation of a live-analysis digital forensic system
As the popularity of the internet continues growing, not only change our life, but also change the way of crime. Number of crime by computer as tools, place or target, cases of su...
Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn
SADFE
2007
IEEE
14 years 2 months ago
Toward Models for Forensic Analysis
The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a m...
Sean Peisert, Matt Bishop, Sidney Karin, Keith Mar...
IMF
2007
13 years 10 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
IMF
2007
13 years 10 months ago
Taxonomy of Anti-Computer Forensics Threats
Joseph C. Sremack, Alexandre V. Antonov