Academic literature on the topic 'Computer forensic investigation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer forensic investigation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer forensic investigation"
Kovalev, Sergey Aleksandroviсh. "Allpying the Method of Criminalistc Computer Modeling in Crime Investigation." Webology 18, SI05 (October 30, 2021): 871–78. http://dx.doi.org/10.14704/web/v18si05/web18268.
Full textAziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (April 2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.
Full textBrown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.
Full textRehman, Danish, and Er Jasdeep Singh. "A Study of Minimization of Cybercrimes by the Implementation of Cyber Forensics Tool Kit." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1335–45. http://dx.doi.org/10.22214/ijraset.2022.40867.
Full textAltheyabi, Jasir Adel. "The Digital Forensic Tools Accuracy and Specifications." Academic Journal of Research and Scientific Publishing 3, no. 35 (March 5, 2022): 58–65. http://dx.doi.org/10.52132/ajrsp.e.2022.35.3.
Full textGuo, Yinghua, and Jill Slay. "Testing Forensic Copy Function of Computer Forensics Investigation Tools." Journal of Digital Forensic Practice 3, no. 1 (March 18, 2010): 46–61. http://dx.doi.org/10.1080/15567280903521392.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Full textHikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (January 7, 2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Full textBaafi, Peter Oppong. "Tools For Cyber Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 2022): 285–90. http://dx.doi.org/10.22624/aims/crp-bk3-p46.
Full textDissertations / Theses on the topic "Computer forensic investigation"
Law, Yuet-wing, and 羅越榮. "Investigation models for emerging computer forensic challenges." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971324.
Full textSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Full textMontasari, Reza. "The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice." Thesis, University of Derby, 2016. http://hdl.handle.net/10545/620799.
Full textEtow, Tambue Ramine. "IMPACT OF ANTI-FORENSICS TECHNIQUES ON DIGITAL FORENSICS INVESTIGATION." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97116.
Full textFairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.
Full textBourg, Rachel. "Bloom Filters for Filesystem Forensics." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/1288.
Full textWang, Mengmeng, and 王萌萌. "Temporal analysis on HFS+ and across file systems in digital forensic investigation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B50900122.
Full textpublished_or_final_version
Computer Science
Master
Master of Philosophy
Sonnekus, Michael Hendrik. "A comparison of open source and proprietary digital forensic software." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.
Full textMarziale, Lodovico. "Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.
Full textHashim, Noor Hayati. "An architecture for the forensic analysis of Windows system generated artefacts." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/forensic-analysis-of-windows-system-generated-artefacts(be571569-2afe-4d52-8c99-9dbc8388b1db).html.
Full textBooks on the topic "Computer forensic investigation"
Okedeji, Abioye. Computer forensic investigation. London: University of East London, 2003.
Find full textJohnson, Thomas Alfred. Forensic computer crime investigation. Boca Raton: CRC, Taylor & Francis, 2006.
Find full textComputer forensics: Computer crime scene investigation. 2nd ed. Hingham, Mass: Charles River Media, 2005.
Find full textVacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Sudbury, Mass: Jones and Bartlett Publishers, 2010.
Find full textComputer forensics: Computer crime scene investigation. Hingham, Mass: Charles River Media, 2002.
Find full textComputer evidence: A forensic investigations handbook. London: Sweet & Maxwell, 1997.
Find full textGregory, Kipper, and ScienceDirect (Online service), eds. Virtualization and forensics: A digital forensic investigator's guide to virtual environments. Amsterdam: Syngress/Elsevier, 2010.
Find full textProsise, Chris. Incident response & computer forensics. 2nd ed. New York: McGraw-Hill/Osborne, 2003.
Find full textK, Rudolph, ed. System forensics, investigation, and response. Sudbury, MA: Jones & Bartlett Learning, 2010.
Find full textBook chapters on the topic "Computer forensic investigation"
Pajek, Przemyslaw, and Elias Pimenidis. "Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation." In Global Security, Safety, and Sustainability, 145–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04062-7_16.
Full textLim, Kyung-Soo, and Changhoon Lee. "Applying Forensic Approach to Live Investigation Using XeBag." In Computer Science and its Applications, 389–97. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5699-1_38.
Full textSingh, Avinash, Adeyemi R. Ikuesan, and Hein S. Venter. "Digital Forensic Readiness Framework for Ransomware Investigation." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 91–105. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05487-8_5.
Full textPatil, Vaibhav T., and Amrita A. Manjrekar. "A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation." In Communications in Computer and Information Science, 162–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40576-1_16.
Full textHou, Shuhui, Ryoichi Sasaki, Tetsutaro Uehara, and Siuming Yiu. "Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation." In Lecture Notes in Computer Science, 312–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36818-9_33.
Full textSimou, Stavros, Christos Kalloniatis, Stefanos Gritzalis, and Vasilis Katos. "A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services." In Communications in Computer and Information Science, 161–77. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37545-4_11.
Full textZhou, Qin, and Nigel Poole. "Forensic Investigation of the Soft-Modded PlayStation Portable (PSP)." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 50–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11530-1_6.
Full textRekhis, Slim, and Noureddine Boudriga. "A Temporal Logic-Based Model for Forensic Investigation in Networked System Security." In Lecture Notes in Computer Science, 325–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326_25.
Full textJohnson, Chris. "Forensic Software Engineering and the Need for New Approaches to Accident Investigation." In Computer Safety, Reliability and Security, 420–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40891-6_36.
Full textNissan, Ephraim. "The Forensic Disciplines: Some Areas of Actual or Potential Application." In Computer Applications for Handling Legal Evidence, Police Investigation and Case Argumentation, 841–989. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-90-481-8990-8_8.
Full textConference papers on the topic "Computer forensic investigation"
Anani-Manyo, Nina, and Rui Liu. "Computer Vision and Forensic Investigation." In Ninth Congress on Forensic Engineering. Reston, VA: American Society of Civil Engineers, 2022. http://dx.doi.org/10.1061/9780784484548.061.
Full textStander, Adrie, and Kevin Johnston. "The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3058.
Full textSingh, Nanhay. "Digital Image Steganalysis for Computer Forensic Investigation." In The Second International Conference on Computer Science, Engineering and Applications. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2217.
Full textSingh, Kumar Shanu, Annie Irfan, and Neelam Dayal. "Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036214.
Full textPowar, Varsha, Amruta Kulkami, Renuka Lokare, and Aishwarya Lonkar. "Skin detection for forensic investigation." In 2013 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2013. http://dx.doi.org/10.1109/iccci.2013.6466122.
Full textSaidi, Raihana Md, Siti Arpah Ahmad, Noorhayati Mohamed Noor, and Rozita Yunos. "Windows registry analysis for forensic investigation." In 2013 International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE). IEEE, 2013. http://dx.doi.org/10.1109/taeece.2013.6557209.
Full textStudiawan, Hudan, Ferdous Sohel, and Christian Payne. "Automatic Event Log Abstraction to Support Forensic Investigation." In ACSW '20: Australasian Computer Science Week 2020. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3373017.3373018.
Full textBhatt, Parth, and Edgar Yano. "Analyzing Targeted Attacks using Hadoop applied to Forensic Investigation." In The Eighth International Conference on Forensic Computer Science. Abeat, 2013. http://dx.doi.org/10.5769/c2013004.
Full textQu, Chengchao, Jurgen Metzler, and Eduardo Monari. "ivisX: An Integrated Video Investigation Suite for Forensic Applications." In 2018 IEEE Winter Applications of Computer Vision Workshops (WACVW). IEEE, 2018. http://dx.doi.org/10.1109/wacvw.2018.00007.
Full textAlalwan, Nasser, Ahmed Alzahran, and Mohamed Sarrab. "Cybercrime Investigation Challenges for Gulf Cooperation Council Governments: A Survey." In The Eighth International Conference on Forensic Computer Science. Abeat, 2013. http://dx.doi.org/10.5769/c2013005.
Full text