Results 51 to 60 of about 106,068 (200)

The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY

open access: yes, 2011
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases.
Debbabi, Mourad   +2 more
core   +1 more source

A comparative study of teaching forensics at a university degree level [PDF]

open access: yes, 2006
Computer forensics is a relatively young University discipline which has developed strongly in the United States and the United Kingdom but is still in its infancy in continental Europe.
Anderson, Philip   +6 more
core   +1 more source

Watch your step!: a frustrated total internal reflection approach to forensic footwear imaging [PDF]

open access: yes, 2016
Forensic image retrieval and processing are vital tools in the fight against crime e.g. during fingerprint capture. However, despite recent advances in machine vision technology and image processing techniques (and contrary to the claims of popular ...
B Chennankara   +13 more
core   +2 more sources

Digital Forensics in Action The Role of Digital Forensics in Cybercrime Investigations

open access: yesNUML International Journal of Engineering and Computing
The explosion of technology in recent years has revolutionized the face of cybercrime and requires new and innovative approaches to investigating digital crimes.
Hassan Shah Khan   +2 more
doaj   +5 more sources

Rethinking Security Incident Response: The Integration of Agile Principles [PDF]

open access: yes, 2014
In today's globally networked environment, information security incidents can inflict staggering financial losses on organizations. Industry reports indicate that fundamental problems exist with the application of current linear plan-driven security ...
Glisson, William Bradley   +2 more
core   +2 more sources

Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware

open access: yesApplied Sciences, 2020
This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP)
Claudinei Morin da Silveira   +6 more
doaj   +1 more source

Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]

open access: yes, 2017
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq   +2 more
core   +1 more source

Conceptual evidence collection and analysis methodology for Android devices

open access: yes, 2015
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android
Al Mutawa   +23 more
core   +1 more source

A Case-Based Reasoning Method for Locating Evidence During Digital Forensic Device Triage [PDF]

open access: yes, 2014
The role of triage in digital forensics is disputed, with some practitioners questioning its reliability for identifying evidential data. Although successfully implemented in the field of medicine, triage has not established itself to the same degree in ...
Horsman, Graeme   +2 more
core   +1 more source

Analysis of Forensic Disk Imaging Tools for Data Acquisition and Preservation

open access: yesJournal of Informatics and Web Engineering
The identification, preservation, analysis, and presentation of electronic evidence to support legal or organizational inquiries constitute the discipline of digital forensics, which is crucial to contemporary investigations.
Michelle Chee Ern Lim   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy