Results 51 to 60 of about 20,944 (204)

Digital Forensics to Intelligent Forensics

open access: yesFuture Internet, 2014
In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation.
Alastair Irons, Harjinder Singh Lallie
doaj   +1 more source

The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY

open access: yes, 2011
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases.
Debbabi, Mourad   +2 more
core   +1 more source

Forensic Analysis of Web Scraping Documents on Carding Forums and Shops using Latent Dirichlet Allocation: Profiling Forensic and NLP Approaches for Cybercrime Investigation

open access: yesJOIN: Jurnal Online Informatika
This research is based on the massive cybercrime activity in carding forums and carding shops. Based on the many victims and losses from these activities a cybercrime investigation action is needed by a digital forensic investigator.
Fikri Irfan Adristi, Yudi Prayudi
doaj   +1 more source

Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

open access: yesJournal of Digital Forensics, Security and Law, 2013
Shavers, B. (2013). Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. Waltham, MA: Elsevier, 290 pages, ISBN-978-1-59749-985-9, US$51.56. Includes bibliographical references and
Thomas Nash
doaj  

Investigating Electronic Defamation Using the Internet

open access: yesالمجلة الدولية للعلوم الإنسانية والاجتماعية
The study was aimed at identifying the most important methods that help in developing criminal investigation skills to confront cyber-crimes. The study was based on more than one approach.
Nibras Salem Khudair
doaj   +1 more source

PENEGAKAN HUKUM TERHADAP KEJAHATAN DALAM DUNIA MAYA [PDF]

open access: yes, 2009
Law enforcement particularly in relation to the process of proof in criminal acts in Indonesia Cybercrime maximum is not enough because there are juridical obstacles faced by the Indonesian legal device-related evidence.
SAPUTRA, LIEM DEDI
core  

General Counsel of the FBI, James Baker, in Conversation with Professor Mary DeRosa on the FBI and International Justice [PDF]

open access: yes, 2017
Mary DeRosa, Georgetown Law Professor, former Deputy Counsel to President Obama for National Security Affairs, former Legal Advisor to the National Security Council under President Obama, and former Deputy Legal Adviser to the National Security Council ...
DeRosa, Mary B.
core   +1 more source

Towards a Comprehensive Metaverse Forensic Framework Based on Technology Task Fit Model

open access: yesFuture Internet
This article introduces a robust metaverse forensic framework designed to facilitate the investigation of cybercrime within the dynamic and complex digital metaverse.
Amna AlMutawa   +2 more
doaj   +1 more source

Dark clouds on the horizon:the challenge of cloud forensics [PDF]

open access: yes, 2018
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian   +2 more
core   +1 more source

Economic Factors of Vulnerability Trade and Exploitation

open access: yes, 2017
Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently
Allodi Luca, Allodi Luca
core   +1 more source

Home - About - Disclaimer - Privacy