To see the other types of publications on this topic, follow the link: Data forensics.

Dissertations / Theses on the topic 'Data forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Data forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Fei, Bennie Kar Leung. "Data visualisation in digital forensics." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-03072007-153241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dontula, Varun. "Data Exploration Interface for Digital Forensics." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1373.

Full text
Abstract:
The fast capacity growth of cheap storage devices presents an ever-growing problem of scale for digital forensic investigations. One aspect of scale problem in the forensic process is the need for new approaches to visually presenting and analyzing large amounts of data. Current generation of tools universally employ three basic GUI components—trees, tables, and viewers—to present all relevant information. This approach is not scalable as increasing the size of the input data leads to a proportional increase in the amount of data presented to the analyst. We present an alternative approach, wh
APA, Harvard, Vancouver, ISO, and other styles
3

Davidsson, Pontus, and Niklas Englund. "Docker forensics: Investigation and data recovery on containers." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42498.

Full text
Abstract:
Container technology continuously grows in popularity, and the forensic area is less explored than other areas of research concerning containers. The aim of this thesis is, therefore, to explore Docker containers in a forensic investigation to test whether data can be recovered from deleted containers and how malicious processes can be detected in active containers. The results of the experiments show that, depending on which container is used, and how it is configured, data sometimes persists after the container is removed. Furthermore, file carving is tested and evaluated as a useful method
APA, Harvard, Vancouver, ISO, and other styles
4

Beyers, Hector Quintus. "Database forensics : Investigating compromised database management systems." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/41016.

Full text
Abstract:
The use of databases has become an integral part of modern human life. Often the data contained within databases has substantial value to enterprises and individuals. As databases become a greater part of people’s daily lives, it becomes increasingly interlinked with human behaviour. Negative aspects of this behaviour might include criminal activity, negligence and malicious intent. In these scenarios a forensic investigation is required to collect evidence to determine what happened on a crime scene and who is responsible for the crime. A large amount of the research that is available focu
APA, Harvard, Vancouver, ISO, and other styles
5

Moses, Samuel Isaiah. "Measuring The Robustness of Forensic Tools' Ability to Detect Data Hiding Techniques." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6464.

Full text
Abstract:
The goal of this research is to create a methodology that measures the robustness and effectiveness of forensic tools' ability to detect data hiding. First, an extensive search for any existing guidelines testing against data hiding was performed. After finding none, existing guidelines and frameworks in cybersecurity and cyber forensics were reviewed. Next, I created the methodology in this thesis. This methodology includes a set of steps that a user should take to evaluate a forensic tool. The methodology has been designed to be flexible and scalable so as new anti-forensic data hiding metho
APA, Harvard, Vancouver, ISO, and other styles
6

Sansurooah, Krishnun. "A forensics framework and method in the acquisition and extraction of data from NAND Flash memory storage chip." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1725.

Full text
Abstract:
The aim of this thesis is to investigate a method for acquiring and extracting data from NAND flash memory storage devices and to validate that methodology. Furthermore, a validated and reproducible framework for the acquisition and extraction of data from the NAND flash memory storage chip is developed as a guideline for forensic investigators who are required to preserve and recover data stored on NAND flash memory storage devices in a forensically acceptable manner. The digital forensic community is currently facing a situation determined by the rapidly increasing popularity of NAND flash m
APA, Harvard, Vancouver, ISO, and other styles
7

Hannay, Peter. "A non-device specific framework for the development of forensic locational data analysis procedure for consumer grade small and embedded devices." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2017. https://ro.ecu.edu.au/theses/2026.

Full text
Abstract:
Portable and wearable computing devices such as smart watches, navigation units, mobile phones, and tablet computers commonly ship with Global Navigation Satellite System (GNSS) supported locational awareness. Locational functionality is no longer limited to navigation specific devices such as satellite navigation devices and location tracking systems. Instead the use of these technologies has extended to become secondary functionality on many devices, including mobile phones, cameras, portable computers, and video game consoles. The increase in use of location aware technology is of use to fo
APA, Harvard, Vancouver, ISO, and other styles
8

Mohammed, Hussam J. "Automated identification of digital evidence across heterogeneous data resources." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12839.

Full text
Abstract:
Digital forensics has become an increasingly important tool in the fight against cyber and computer-assisted crime. However, with an increasing range of technologies at people's disposal, investigators find themselves having to process and analyse many systems with large volumes of data (e.g., PCs, laptops, tablets, and smartphones) within a single case. Unfortunately, current digital forensic tools operate in an isolated manner, investigating systems and applications individually. The heterogeneity and volume of evidence place time constraints and a significant burden on investigators. Exampl
APA, Harvard, Vancouver, ISO, and other styles
9

Sjöstrand, Mattias. "Combatting the data volume issue in digital forensics : A structured literature review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18822.

Full text
Abstract:
The increase in data volume and amount of data sources submitted as evidence such as from Internet of Things (IoT) devices or cloud computing systems has caused the digital forensics process to take longer than before. The increase in time consumption applies to all stages of the digital forensics process which includes collection, processing and analysing material. Researchers have proposed many different solutions to this problem and the aim of this study is to summarize these solutions by conducting a systematic literature review. The literature review uses a handful of search terms applied
APA, Harvard, Vancouver, ISO, and other styles
10

Ge, Jianye. "Computational Algorithms and Evidence Interpretation in DNA Forensics based on Genomic Data." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1234916402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Giudice, Oliver. "Digital Forensics Ballistics: Reconstructing the source of an evidence exploiting multimedia data." Doctoral thesis, Università di Catania, 2017. http://hdl.handle.net/10761/3896.

Full text
Abstract:
The Forensic Science (sometimes shortened to Forensics) is the application of technical and scientific methods to the justice, investigation and evidence discovery domain. Specifically finding evidences can be trivial and in many fields is achieved with methods that exploits manual processes and the experience of the forensics examiner. Though human factor can be often discussed and the evidences collected and found without repeatable and scientific methods could be of no use in tribunal. For these reasons this thesis focus on the investigation and development of classification engine able to
APA, Harvard, Vancouver, ISO, and other styles
12

Shakir, Amer, Muhammad Hammad, and Muhammad Kamran. "Comparative Analysis & Study of Android/iOS MobileForensics Tools." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44797.

Full text
Abstract:
This report aims to draw a comparison between two commercial mobile forensics and recovery tools, Magnet AXIOM and MOBILedit. A thorough look at previously done studies was helpful to know what aspects of the data extractions must be compared and which areas are the most important ones to focus upon. This work focuses on how the data extracted from one tool compares with another and provides comprehensive extraction based on different scenarios, circumstances, and aspects. Performances of both tools are compared based on various benchmarks and criteria. This study has helped establish that MOB
APA, Harvard, Vancouver, ISO, and other styles
13

Ghasemi, Damavandi Hamidreza. "Data analytics, interpretation and machine learning for environmental forensics using peak mapping methods." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/2083.

Full text
Abstract:
In this work our driving motivation is to develop mathematically robust and computationally efficient algorithms that will help chemists towards their goal of pattern matching. Environmental chemistry today broadly faces difficult computational and interpretational challenges for vast and ever-increasing data repositories. A driving factor behind these challenges are little known intricate relationships between constituent analytes that constitute complex mixtures spanning a range of target and non-target compounds. While the end of go
APA, Harvard, Vancouver, ISO, and other styles
14

Oskarsson, Tim. "Digital incursion: Breaching the android lock screen and liberating data." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44939.

Full text
Abstract:
Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. In this paper, the advantages and disadvantages of different methods of gaining access and extracting data from an android device with an unlocked bootloader are discussed. Many users unlock the bootloader of their android device to gain a much greater level of control over it. Android forens
APA, Harvard, Vancouver, ISO, and other styles
15

Tingstrom, Daniel. "Cheetah: An Economical Distributed RAM Drive." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/323.

Full text
Abstract:
Current hard drive technology shows a widening gap between the ability to store vast amounts of data and the ability to process. To overcome the problems of this secular trend, we explore the use of available distributed RAM resources to effectively replace a mechanical hard drive. The essential approach is a distributed Linux block device that spreads its blocks throughout spare RAM on a cluster and transfers blocks using network capacity. The presented solution is LAN-scalable, easy to deploy, and faster than a commodity hard drive. The specific driving problem is I/O intensive appl
APA, Harvard, Vancouver, ISO, and other styles
16

Ware, Scott. "HFS Plus File System Exposition and Forensics." Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5559.

Full text
Abstract:
The Macintosh Hierarchical File System Plus, HFS+, or as it is commonly referred to as the Mac Operating System, OS, Extended, was introduced in 1998 with Mac OS X 8.1. HFS+ is an update to HFS, Mac OS Standard format that offers more efficient use of disk space, implements international friendly file names, future support for named forks, and facilitates booting on non-Mac OS operating systems through different partition schemes. The HFS+ file system is efficient, yet, complex. It makes use of B-trees to implement key data structures for maintaining meta-data about folders, files, and da
APA, Harvard, Vancouver, ISO, and other styles
17

Furuseth, Andreas Grytting. "Digital Forensics: Methods and tools for retrieval and analysis of security credentials and hidden data." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9264.

Full text
Abstract:
<p>This master thesis proposes digital forensic methods for retrieval and analysis of steganography during a digital investigation. These proposed methods are examined using scenarios. From the examination of steganography and these cases, it is concluded that the recommended methods can be automated and increase the chances for an investigator to detect steganography.</p>
APA, Harvard, Vancouver, ISO, and other styles
18

Roscigno, Gianluca. "The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics." Doctoral thesis, Universita degli studi di Salerno, 2016. http://hdl.handle.net/10556/2309.

Full text
Abstract:
2014 - 2015<br>The era of Big Data is leading the generation of large amounts of data, which require storage and analysis capabilities that can be only ad- dressed by distributed computing systems. To facilitate large-scale distributed computing, many programming paradigms and frame- works have been proposed, such as MapReduce and Apache Hadoop, which transparently address some issues of distributed systems and hide most of their technical details. Hadoop is currently the most popular and mature framework sup- porting the MapReduce paradigm, and it is widely used to store and
APA, Harvard, Vancouver, ISO, and other styles
19

Jiang, Lin, and 蒋琳. "New cryptographic schemes with application in network security and computer forensics." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B44753226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Moody, Sarah Jean. "Automated Data Type Identification And Localization Using Statistical Analysis Data Identification." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/9.

Full text
Abstract:
This research presents a new and unique technique called SÁDI, statistical analysis data identification, for identifying the type of data on a digital device and its storage format based on data type, specifically the values of the bytes representing the data being examined. This research incorporates the automation required for specialized data identification tools to be useful and applicable in real-world applications. The SÁDI technique utilizes the byte values of the data stored on a digital storage device in such a way that the accuracy of the technique does not rely solely on the potenti
APA, Harvard, Vancouver, ISO, and other styles
21

Tagesson, Samuel. "Anti-forensik mot minnesforensik : En litteraturstudie om anti-forensiska metoder mot minnesdumpning och minnesanalys." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17818.

Full text
Abstract:
IT-forensiker möter många svårigheter i sitt arbete med att inhämta och analysera data. Brottslingar använder mer och mer anti-forensiska metoder för att gömma bevis som kan användas emot dem. En vanligt förekommande anti-forensisk metod är kryptering. För att IT-forensiker skall kunna komma åt den krypterade informationen kan krypteringsnyckeln hittas i minnet på datorn. Vilket gör att datorns minne blir värdefullt att hämta och analysera. Däremot finns det flera anti-forensiska metoder som en förbrytare kan använda för att förhindra att minnet hämtas eller analyseras. Denna studie utför en
APA, Harvard, Vancouver, ISO, and other styles
22

Andersson, Victor. "Standards and methodologies for evaluating digital forensics tools : Developing and testing a new methodology." Thesis, Högskolan i Halmstad, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37485.

Full text
Abstract:
Standards play a big role in a lot of professions and when it comes to most aspects of law enforcement and forensic investigation, it’s no different. Despite that, for some reason, there aren’t any for when it comes to evaluating and choosing forensic tools. The lack of an international standard for evaluating forensic tools has a clear negative impact on the digital forensics community as it lowers the value of tool tests and evaluations and hinders both the reproducibility and verification of their results. Most tool evaluations are performed with custom forensic images and measures metrics
APA, Harvard, Vancouver, ISO, and other styles
23

McCallister, Ronald F. "Forensic Computing for Non-Profits: A Case Study for Consideration When Non-Profits Need to Determine if a Computer Forensic Investigation is Warranted." [Johnson City, Tenn. : East Tennessee State University], 2004. https://dc.etsu.edu/etd/940.

Full text
Abstract:
Thesis (M.S.)--East Tennessee State University, 2004.<br>Title from electronic submission form. ETSU ETD database URN: etd-0831104-124226 Includes bibliographical references. Also available via Internet at the UMI web site.
APA, Harvard, Vancouver, ISO, and other styles
24

Blid, Emma, and Patrick Massler. "Den IT-forensiska utvinningen i molnet : En kartläggning över den IT-forensiska utvinningen i samband med molntjänster samt vilka möjligheter och svårigheter den möter." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-34872.

Full text
Abstract:
Det blir allt vanligare att spara data online, i stället för på fysiska lagringsmedium. Detta bringar många möjligheter för dig som användare, men orsakar också nya problem framför allt inom utredningsarbetet. Problemen i kombinationen IT-forensik och molntjänster kan framför allt delas upp i två kategorier, vilka är juridiska respektive tekniska problem. De juridiska problemen berör främst att servern som lagrar data och ägaren till denna ofta befinner sig i en annan nation än där det misstänkta brottet utreds. De flesta juridiska problem kan tyckas enkla att lösa genom lagändringar, men är m
APA, Harvard, Vancouver, ISO, and other styles
25

Dlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.

Full text
Abstract:
The increasing number of reports on data leakage incidents increasingly erodes the already low consumer confidence in cloud services. Hence, some organisations are still hesitant to fully trust the cloud with their confidential data. Therefore, this study raises a critical and challenging research question: How can we restore the damaged consumer confidence and improve the uptake and security of cloud services? This study makes a plausible attempt at unpacking and answering the research question in order to holistically address the data leakage problem from three fronts, i.e. conflict-aware vi
APA, Harvard, Vancouver, ISO, and other styles
26

Karresand, Martin. "Completing the Picture : Fragments and Back Again." Licentiate thesis, Linköping : Department of Computer and Information Science, Linköpings universitet, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Nordin, Anton, and Felix Liffner. "Forensiska Artefakter hos Mobila Applikationer : Utvinning och Analys av Applikationen Snapchat." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40207.

Full text
Abstract:
Today's smartphones and tablets use different applications and software for all sorts of purposes: communication, entertainment, fitness, to share images with each other, to keep up to date with the news and lots of different daily tasks. With the heavy usage of all these apps, it is no wonder that it comes with a few issues. Private data is stored in large quantities both on the local device and on the app-creators' servers. It is no wonder that applications advertising user secrecy and transient storage of user data. One of these applications is Snapchat, with over 500 million downloads on G
APA, Harvard, Vancouver, ISO, and other styles
28

Homem, Irvin. "LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902.

Full text
Abstract:
The Internet in its most basic form is a complex information sharing organism. There are billions of interconnected elements with varying capabilities that work together supporting numerous activities (services) through this information sharing. In recent times, these elements have become portable, mobile, highly computationally capable and more than ever intertwined with human controllers and their activities. They are also rapidly being embedded into other everyday objects and sharing more and more information in order to facilitate automation, signaling that the rise of the Internet of Thin
APA, Harvard, Vancouver, ISO, and other styles
29

Bond, Elyse. "Creating Volatility Support for FreeBSD." ScholarWorks@UNO, 2015. http://scholarworks.uno.edu/td/2033.

Full text
Abstract:
Digital forensics is the investigation and recovery of data from digital hardware. The field has grown in recent years to include support for operating systems such as Windows, Linux and Mac OS X. However, little to no support has been provided for less well known systems such as the FreeBSD operating system. The project presented in this paper focuses on creating the foundational support for FreeBSD via Volatility, a leading forensic tool in the digital forensic community. The kernel and source code for FreeBSD were studied to understand how to recover various data from analysis of a given sy
APA, Harvard, Vancouver, ISO, and other styles
30

gorbov, sergey. "Practical Application of Fast Disk Analysis for Selective Data Acquisition." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2230.

Full text
Abstract:
Using a forensic imager to produce a copy of the storage is a common practice. Due to the large volumes of the modern disks, the imaging may impose severe time overhead which ultimately delays the investigation process. We proposed automated disk analysis techniques that precisely identify regions on the disk that contain data. We also developed a high performance imager that produces AFFv3 images at rates exceeding 300MB/s. Using multiple disk analysis strategies we can analyze a disk within a few minutes and yet reduce the imaging time of by many hours. Partial AFFv3 images produced by our i
APA, Harvard, Vancouver, ISO, and other styles
31

Kiltz, Stefan [Verfasser], and Jana [Gutachter] Dittmann. "Data-Centric Examination Approach (DCEA) for a qualitative determination of error, loss and uncertainty in digital and digitised forensics / Stefan Kiltz ; Gutachter: Jana Dittmann." Magdeburg : Universitätsbibliothek Otto-von-Guericke-Universität, 2020. http://d-nb.info/1220035033/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kiltz, Stefan Verfasser], and Jana [Gutachter] [Dittmann. "Data-Centric Examination Approach (DCEA) for a qualitative determination of error, loss and uncertainty in digital and digitised forensics / Stefan Kiltz ; Gutachter: Jana Dittmann." Magdeburg : Universitätsbibliothek Otto-von-Guericke-Universität, 2020. http://d-nb.info/1220035033/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Olsson, Andreas. "Hanteringen av integritetsperspektiv inom IT-forensik : En kvalitativ intervjustudie med rättsväsendets aktörer." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17208.

Full text
Abstract:
IT-forensik har funnits i många år och vuxit fram inom brottsutredningar då allt blir mer digitaliserat i vårt samhälle. Samtidigt som det blir mer digitalisering ökar mängden data inom IT. Mycket av vårt privata liv lagras i telefoner eller datorer, till exempel bilder eller personuppgifter. På senare år har integriteten blivit viktigare för varje individ och att följa de mänskliga rättigheterna är ett måste i dagsläget. IT-forensik är i grunden ett integritetsintrång hos den misstänkte och det betyder att aktörerna som utför detta måste vara mer försiktiga och ta hänsyn till de involverades
APA, Harvard, Vancouver, ISO, and other styles
34

Oliveira, José Antonio Maurilio Milagre de [UNESP]. "Inteligência cibernética e uso de recursos semânticos na detecção de perfis falsos no contexto do Big Data." Universidade Estadual Paulista (UNESP), 2016. http://hdl.handle.net/11449/138869.

Full text
Abstract:
Submitted by JOSÉ ANTONIO MAURILIO MILAGRE DE OLIVEIRA null (ja.milagre@gmail.com) on 2016-05-24T12:10:40Z No. of bitstreams: 1 oliveira_jamm_me_mar.pdf: 2437838 bytes, checksum: eda292f5276e7bed32388a02a57f2187 (MD5)<br>Approved for entry into archive by Juliano Benedito Ferreira (julianoferreira@reitoria.unesp.br) on 2016-05-25T13:32:57Z (GMT) No. of bitstreams: 1 oliveira_jamm_me_mar.pdf: 2437838 bytes, checksum: eda292f5276e7bed32388a02a57f2187 (MD5)<br>Made available in DSpace on 2016-05-25T13:32:57Z (GMT). No. of bitstreams: 1 oliveira_jamm_me_mar.pdf: 2437838 bytes, checksum: eda292
APA, Harvard, Vancouver, ISO, and other styles
35

Geier, Florian. "The differences between SSD and HDD technology regarding forensic investigations." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-44921.

Full text
Abstract:
In the past years solid state disks have developed drastically and are now gaining increased popularity compared to conventional hard drives. While hard disk drives work predictable, transparent SSD routines work in the background without the user’s knowledge. This work describes the changes to the everyday life for forensic specialists; a forensic investigation includes data recovery and the gathering of a digital image of each acquired memory that provides proof of integrity through a checksum. Due to the internal routines, which cannot be stopped, checksums are falsified. Therefore the imag
APA, Harvard, Vancouver, ISO, and other styles
36

Martinka, Jan. "Digitální forenzní věda a její aplikace při forenzním auditu účetnictví." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-193055.

Full text
Abstract:
This thesis aims to describe a process framework suitable for conducting digital forensics investigation projects as support for forensic audit. Selection of existing digital forensics investigation framework was a subject of criterial comparison. Described new framework is a result of combination and enhancement of those frameworks, which were suitable for the characteristics of forensic audit. Thesis also discusses digital forensics methods for fraud examination and risk assessment as a part of external audit.
APA, Harvard, Vancouver, ISO, and other styles
37

Vike, Kristine. "Oil spill forensics : Identification of sources for oil spills by using data generated by GC-MS and ICP-MS combined with multivariate statistics and the COSIWeb database." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for kjemi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-24920.

Full text
Abstract:
This work has been a preliminary study, aimed at investigating whether or not trace metal Inductively Coupled Plasma-Mass Spectrometry (ICP-MS) analysis could be a viable tool in the oil spill investigation toolbox, after having been abandoned over 20 years ago. The sample material was two previous oil spills, Full City and Server, and various heavily weathered oil samples gathered from islands off the Tr&#248;ndelag coast. The islands were Kya, Sula, Vesterkalven, Storkalven, Kunna, and the bay Kjerv&#229;gsundet on the larger island Fr&#248;ya. The samples were prepared in a laboratory and a
APA, Harvard, Vancouver, ISO, and other styles
38

Josefík, Martin. "Distribuovaný repositář digitálních forenzních dat." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385958.

Full text
Abstract:
This work deals with the design of distributed repository aimed at storing digital forensic data. The theoretical part of the thesis describes digital forensics and what is its purpose. There are also explained Big data, suitable storages, their properties, advantages and disadvantages, in this part. The main part of the thesis deals with the design and implementation of distributed storage for digital forensic data. The design is also focused in suitable indexing of stored data, and supporting new types of digital forensic data. The performance of implemented system was evaluated for chosen t
APA, Harvard, Vancouver, ISO, and other styles
39

Barreto, Andres E. "API-Based Acquisition of Evidence from Cloud Storage Providers." ScholarWorks@UNO, 2015. http://scholarworks.uno.edu/td/2030.

Full text
Abstract:
Cloud computing and cloud storage services, in particular, pose a new challenge to digital forensic investigations. Currently, evidence acquisition for such services still follows the traditional approach of collecting artifacts on a client device. In this work, we show that such an approach not only requires upfront substantial investment in reverse engineering each service, but is also inherently incomplete as it misses prior versions of the artifacts, as well as cloud-only artifacts that do not have standard serialized representations on the client. In this work, we introduce the concept of
APA, Harvard, Vancouver, ISO, and other styles
40

Mikus, Nicholas A. "An analysis of disc carving techniques." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FMikus.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gou, Hongmei. "Digital forensic techniques for graphic data." College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7361.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2007.<br>Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
42

Blacher, Zak. "Cluster-Slack Retention Characteristics: A Study of the NTFS Filesystem." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-6000.

Full text
Abstract:
<p>This paper explores the statistical properties of microfragment recovery techniques used on NTFS filesystems in the use of digital forensics. A microfragment is the remnant file-data existing in the cluster slack after this file has been overwritten. The total amount of cluster slack is related to the size distribution of the overwriting files as well as to the size of cluster. Experiments have been performed by varying the size distributions of the overwriting files as well as the cluster sizes of the partition. These results are then compared with existing analytical models.</p><br>FIVES
APA, Harvard, Vancouver, ISO, and other styles
43

Daniels, Jason M. "Forensic and Anti-Forensic Techniques for OLE2-Formatted Documents." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/141.

Full text
Abstract:
Common office documents provide significant opportunity for forensic and anti-forensic work. The Object Linking and Embedding 2 (OLE2) specification used primarily by Microsoft’s Office Suite contains unused or dead space regions that can be over written to hide covert channels of communication. This thesis describes a technique to detect those covert channels and also describes a different method of encoding that lowers the probability of detection. The algorithm developed, called OleDetection, is based on the use of kurtosis and byte frequency distribution statistics to accurately identify O
APA, Harvard, Vancouver, ISO, and other styles
44

LANTERNA, DARIO. "Mining of Forensic Data from File Fragments." Doctoral thesis, Università degli studi di Pavia, 2017. http://hdl.handle.net/11571/1203352.

Full text
Abstract:
The wide use of digital technology has the consequence that data and information useful for investigation have to be extracted from digital devices.<br>The wide use of digital technology has the consequence that data and information useful for investigation have to be extracted from digital devices. The digital devices are rarely the corpus delicti, they usually are analysed to define the digital crime scene and to compose the events timeline. Fragments are common in digital environment analysis. Digital devices manage data splitting them into little parts called blocks, cluster, pages, chun
APA, Harvard, Vancouver, ISO, and other styles
45

Andersson, Roland. "Utvinning av data ur mobiltelefoner : En valideringsstudie av forensiska verktyg." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31556.

Full text
Abstract:
Den vetenskapliga aspekten i de flesta forensiska discipliner är välgrundad och prövad under ett långt tidsperspektiv. Det ökande användandet av digital teknik har gjort att en ny forensisk disciplin har vuxit fram och den vetenskapliga grunden i detta nya forensiska område är i många avseenden fortfarande outforskat. Inom det svenskarättsväsendet krävs att de forensiska metoder som används inom en brottsutredning ska vara kvalitetssäkrade och i största mån vara ackrediterade av ettackrediteringsorgan. Det finns idag få relevanta studier kring validering av forensiska metoder som hanterar smås
APA, Harvard, Vancouver, ISO, and other styles
46

Nadeem, Ashraf Muhammad. "Forensic Multimedia File Carving." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119998.

Full text
Abstract:
Distribution of video contents over the Internet has increased drastically over the past few years. With technological advancements and emergence of social media services, video content sharing has grown exponentially. An increased number of cyber crimes today belong to possession or distribution of illegal video contents over the Internet. Therefore, it is crucial for forensic examiners to have the capability of recovering and analyzing illegal video contents from seized storage devices. File carving is an advanced forensic technique used to recover deleted contents from a storage device even
APA, Harvard, Vancouver, ISO, and other styles
47

Sajja, Abhilash. "Forensic Reconstruction of Fragmented Variable Bitrate MP3 files." ScholarWorks@UNO, 2010. http://scholarworks.uno.edu/td/1258.

Full text
Abstract:
File carving is a technique used to recover data from a digital device without the help of file system metadata. The current file carvers use techniques such as using a list of header and footer values and key word searching to retrieve the information specific to a file type. These techniques tend to fail when the files to be recovered are fragmented. Recovering the fragmented files is one of the primary challenges faced by file carving. In this research we focus on Variable Bit Rate (VBR) MP3 files. MP3 is one of the most widely used file formats for storing audio data. We develop a te
APA, Harvard, Vancouver, ISO, and other styles
48

Larsson, Magnus. "Sanitization of embedded network devices : Investigation of vendor’s factory reset procedure." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166305.

Full text
Abstract:
Embedded devices such as routers, switches, and firewalls commonly have sensitive information stored on them such as passwords, cryptographic keys, and information about the network around them and services that these device(s) provide. When disposing of or reselling this equipment in the secondary market it is crucial to erase this sensitive information. However, there is an important question that must be asked: Do the erase commands and routines offered by the device manufacturers actually erase the sensitive data? This thesis investigates methods and tools to determine the completeness of
APA, Harvard, Vancouver, ISO, and other styles
49

Taylor, Paul Terence Girot. "Postmortem Identification through matching dental traits with population data." Thesis, The University of Sydney, 2003. http://hdl.handle.net/2123/604.

Full text
Abstract:
In cases of forensic dental identification, a key factor in the comparison of the dental status of deceased persons with antemortem dental records is the matching of dental restorations in individual teeth. Many studies have been performed showing the prevalence of dental interventions. This has mostly been performed by counting the numbers of decayed, missing and filled teeth (DMFT) in each mouth without detailed data collection on a per-tooth basis. The purpose of this study was to investigate the research question: to what extent would data on the distribution and prevalence of rest
APA, Harvard, Vancouver, ISO, and other styles
50

Taylor, Paul Terence Girot. "Postmortem Identification through matching dental traits with population data." University of Sydney. Community Oral Health and Epidemiology, 2003. http://hdl.handle.net/2123/604.

Full text
Abstract:
In cases of forensic dental identification, a key factor in the comparison of the dental status of deceased persons with antemortem dental records is the matching of dental restorations in individual teeth. Many studies have been performed showing the prevalence of dental interventions. This has mostly been performed by counting the numbers of decayed, missing and filled teeth (DMFT) in each mouth without detailed data collection on a per-tooth basis. The purpose of this study was to investigate the research question: to what extent would data on the distribution and prevalence of rest
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!