Results 51 to 60 of about 20,944 (204)
Digital Forensics to Intelligent Forensics
In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation.
Alastair Irons, Harjinder Singh Lallie
doaj +1 more source
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases.
Debbabi, Mourad +2 more
core +1 more source
This research is based on the massive cybercrime activity in carding forums and carding shops. Based on the many victims and losses from these activities a cybercrime investigation action is needed by a digital forensic investigator.
Fikri Irfan Adristi, Yudi Prayudi
doaj +1 more source
Shavers, B. (2013). Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. Waltham, MA: Elsevier, 290 pages, ISBN-978-1-59749-985-9, US$51.56. Includes bibliographical references and
Thomas Nash
doaj
Investigating Electronic Defamation Using the Internet
The study was aimed at identifying the most important methods that help in developing criminal investigation skills to confront cyber-crimes. The study was based on more than one approach.
Nibras Salem Khudair
doaj +1 more source
PENEGAKAN HUKUM TERHADAP KEJAHATAN DALAM DUNIA MAYA [PDF]
Law enforcement particularly in relation to the process of proof in criminal acts in Indonesia Cybercrime maximum is not enough because there are juridical obstacles faced by the Indonesian legal device-related evidence.
SAPUTRA, LIEM DEDI
core
General Counsel of the FBI, James Baker, in Conversation with Professor Mary DeRosa on the FBI and International Justice [PDF]
Mary DeRosa, Georgetown Law Professor, former Deputy Counsel to President Obama for National Security Affairs, former Legal Advisor to the National Security Council under President Obama, and former Deputy Legal Adviser to the National Security Council ...
DeRosa, Mary B.
core +1 more source
Towards a Comprehensive Metaverse Forensic Framework Based on Technology Task Fit Model
This article introduces a robust metaverse forensic framework designed to facilitate the investigation of cybercrime within the dynamic and complex digital metaverse.
Amna AlMutawa +2 more
doaj +1 more source
Dark clouds on the horizon:the challenge of cloud forensics [PDF]
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian +2 more
core +1 more source
Economic Factors of Vulnerability Trade and Exploitation
Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently
Allodi Luca, Allodi Luca
core +1 more source

