Results 1 to 10 of about 143,722 (158)

Quantitative evaluation of the results of digital forensic investigations: a review of progress [PDF]

open access: yesForensic Sciences Research, 2021
Unlike conventional forensics, digital forensics does not at present generally quantify the results of its investigations. It is suggested that digital forensics should aim to catch up with other forensic disciplines by using Bayesian and other numerical
Richard E. Overill, Jan Collie
doaj   +2 more sources

Pemanfaatan Raspberry Pi untuk Hacking dan Forensic [PDF]

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2017
Cybercrime because of the people who are not responsible, with the aim of damaging, modifying, and eliminating one's data, one of them with hacking techniques to be able to infiltrate into the data storage makes it easy to commit a crime.
Ilham Taufiqurrohman   +2 more
doaj   +4 more sources

Digital Forensic Tools: A Literature Review [PDF]

open access: yesمجلة التربية والعلم, 2023
Digital forensics is a process of collection, identification, extraction, and documentation of electronic evidence which is used in a court of law. There are a large number of tools that help us to make this process easy and simple.
Karam Salih, Najla Dabagh
doaj   +1 more source

Framework for Digital Forensic Ethical Violations: A Systematic Literature Review [PDF]

open access: yesE3S Web of Conferences, 2023
Handling digital forensic cases plays a critical role in maintaining public interest and trust. However, the lack of an ethical code in digital forensics work processes can compromise the integrity and reliability of inspection results.
Firdonsyah Arizona   +2 more
doaj   +1 more source

Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness [PDF]

open access: yes, 2020
M-health is the current application that capable to monitor and detect human biological change and used the Internet as a platform to transfer and receive the data from the cloud providers.
Abdul Razak, Muhammad Thariq
core   +3 more sources

PRECEPT:a framework for ethical digital forensics investigations [PDF]

open access: yes, 2020
Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able ...
Ferguson, R.I.   +3 more
core   +9 more sources

Pengembangan Model Digital Forensic Readiness Index (DiFRI) untuk Mencegah Kejahatan Dunia Maya

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2016
Kejahatan dunia maya terus meningkat. Namun, peningkatan kejahatan dunia maya, tidak disertai banyaknya barang bukti. Hal ini mengindikasikan kurangnya pemahaman akan kejahatan dunia maya dan juga digital forensic. Kesiapan menangani kejahatan dunia maya
Tri Widodo
doaj   +1 more source

Digital forensics formats: seeking a digital preservation storage format for web archiving [PDF]

open access: yes, 2011
In this paper we discuss archival storage formats from the point of view of digital curation and preservation. Considering established approaches to data management as our jumping off point, we selected seven format attributes which are core to the ...
Kim, Y., Ross, S.
core   +8 more sources

Vehicle Speed Measurement Methodology Robust to Playback Speed-Manipulated Video File

open access: yesIEEE Access, 2021
Concomitant with the virtual ubiquity of dashcams in vehicles, the instantaneous speed of vehicles during accidents can now be measured using dashcam videos to understand the causes of such accidents.
Kyu-Sun Shim   +4 more
doaj   +1 more source

Using a Goal-Driven Approach in the Investigation of a Questioned Contract [PDF]

open access: yes, 2013
Part 3: FORENSIC TECHNIQUESInternational audienceThis paper presents a systematic process for describing digital forensic investigations. It focuses on forensic goals and anti-forensic obstacles and their operationalization in terms of human and software
Aziz, Benjamin, Blackwell, C., Islam, S.
core   +3 more sources

Home - About - Disclaimer - Privacy