Academic literature on the topic 'Digital and Computer Forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital and Computer Forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital and Computer Forensics"

1

Vatsenko, A. "Digital Forensics Techniques Overview." Bulletin of Science and Practice 6, no. 6 (2020): 167–74. http://dx.doi.org/10.33619/2414-2948/55/21.

Full text
Abstract:
This article discusses the important issue of the use of forensic technology in computer forensics. The basic techniques of computer forensics existing today, such as real-time tracking, sandboxing, data and password recovery, and so on, are examined. The advantages and disadvantages of existing methods are given and recommendations are made on the development of computer forensics techniques in the future. Conclusions are drawn up on the problem of using forensic technology in computer forensics.
APA, Harvard, Vancouver, ISO, and other styles
2

Thangavel, Vijayakumar. "Survey on Computer Forensics and its most using Technique Steganography." December 2023 2, no. 2 (2023): 425–34. http://dx.doi.org/10.36548/rrrj.2023.2.013.

Full text
Abstract:
A subfield of digital forensic science called computer forensics deals with evidence discovered on computers and digital storage devices. Computer forensics aims to detect, preserve, retrieve, analyse and communicate facts and views regarding the digital information by performing a forensically sound examination of digital media. The purpose of this study is to provide a brief discussion of computer forensics and related methods. Steganography is one of the most widely utilised of these approaches, and it will also be briefly discussed below.
APA, Harvard, Vancouver, ISO, and other styles
3

Dr., J. Saravanesh. "RETROSPECTIVE VIEW OF DIGITAL FORENSIC PROCESS EMPHASISING COMPUTER FORENSICS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 5 (2019): 509–15. https://doi.org/10.5281/zenodo.3234978.

Full text
Abstract:
Forensics is a constantly improvising field which can be said as an application of science to the legal process. Digital forensics is a division of forensic science detailing the recovery and investigation of material found in digital devices, frequently in relation to computer based crimes. The term digital forensics was initially used as a synonym for computer forensics and has extended to wrap investigation of all devices capable of storing digital data. Branches of forensic science are embedded in every branch of science and many other aspects of Digital era because of its capability to uncover and present objective evidence from varied areas such as business systems, chemistry, ecosystems and accounting. Forensics is an integral part of the judicial system. This paper reviews the basics of digital forensics with an emphasis on computer forensics.
APA, Harvard, Vancouver, ISO, and other styles
4

Senanu, James Hebidzi. "Libforensics For Developing Digital Forensics Applications." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 335–38. http://dx.doi.org/10.22624/aims/crp-bk3-p53.

Full text
Abstract:
The evolution of computers, increase in cybercrime and the demand by law requirements for the production of admissible forensic reports require the application of digital/computer technologies and require the development of a methodology to systematically search digital devices for significant evidence. Cyber and computer fraud are growing by the passing of the day with less than two percent of the reported cases resulting in confidence leading to securing justice and or convictions. This study explores the digital forensic applications and ease of integration of the existing forensic applications. It was the view of the researcher that there exists a gap of monolithic in forensic applications and the cyber universe. One requires different applications to conduct a forensic investigation into a crime revolving around different digital universes. The study proposed research into the development of a single enterprise digital forensic application capable of examining all aspects of the universe regardless and producing an admissible report in the court of law Keywords: Forensic, Cybercrime, Monolithic, Digital universe, Cyberspace, Cyber ecosystem BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: James Hebidzi Senanu (2022): Libforensics For Developing Digital Forensics Applications. Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 335-338 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P53
APA, Harvard, Vancouver, ISO, and other styles
5

Brown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.

Full text
Abstract:
Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic evidence and the legal procedures to be adhered to in evidence gathering at a digital crime scene, presenting at the law courts have proven to be challenging and in some instances inadmissible. Following legal procedures in evidence gathering at a digital crime scene is critical for admissibility and prosecution. This paper aims to discuss digital forensics investigations jurisprudence in relation to distributed digital evidence. For the study to be relevant to policy and practice, forensic tools and frameworks, legal and ethical obligations, and digital evidence handling and admissibility are highlighted. This paper does not follow any forensic investigations process; but rather discusses the need for development and implementation of unique frameworks that could be utilised to gather distributed digital evidence required for admissibility in court. Keywords - Digital forensics investigations; Digital evidence; Jurisprudence BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Kpakpo Brown (2022): Digital Forensic and Distributed Evidence Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 357-362 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P57
APA, Harvard, Vancouver, ISO, and other styles
6

Brushkovskiy, K. B. "Forensics - computer criminalistics." Scientific works "Adilet", no. 3 (2023): 13–18. https://doi.org/10.54649/2077-9860-2023-3-13-18.

Full text
Abstract:
The article discusses issues of solving crimes related to computer information, the study of evidence in the form of computer information, methods of searching, obtaining and securing such evidence. The author gives the concept of “forensics” and reveals its relevance today. He notes that forensics is relevant in the investigation of not only computer crimes, cases of copyright for products presented in electronic form, domain names and other means of individualization on the Internet, but also other types of crimes that are not directly computer crimes, but have digital traces. The scope of application of forensics, forensic characteristics, and stages of the forensic process are also shown.
APA, Harvard, Vancouver, ISO, and other styles
7

Wisdom, Frey John. "Digital Forensics In Multimedia." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 239–50. http://dx.doi.org/10.22624/aims/crp-bk3-p39.

Full text
Abstract:
Digital forensics and multimedia forensics are rapidly growing disciplines where electronic information is extracted and interpreted using scientifically accepted and validated processes, to be used in and outside of a court of law. As personal computing and the internet becomes more widespread, these two fields are becoming increasingly important in law enforcement and cybercrime investigation.Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics which focuses on extracting and analyzing contents such as images, videos, and audio to produce forensic evidence from both regular computer systems and special multimedia devices, such as digital cameras, voice recorders etc. This paper seeks to shed some light on digital forensics in multimedia, methods of authentication and challenges. Keywords: Forensics, Multimedia, Scrutiny, Analysis, Video, Voice, Data, Camera, Authentication BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Frey John Wisdom (2022): Digital Forensics In Multimedia Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 239-250 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P39
APA, Harvard, Vancouver, ISO, and other styles
8

Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.

Full text
Abstract:
Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirements, or by destroying the evidence. Therefore, successful forensic investigations require understanding the possible anti-forensic issues during the investigation. In this paper, the authors present a new method for guiding digital forensics investigations considering the anti-forensics based on goal-driven requirements engineering methodologies, in particular KAOS. Methodologies like KAOS facilitate modeling and reasoning about goals, requirements and obstacles, as well as their operationalization and responsibility assignments. The authors believe that this new method will lead in the future to better management and organization of the various steps of forensics investigations in cyberspace as well as provide more robust grounds for reasoning about forensic evidence.
APA, Harvard, Vancouver, ISO, and other styles
9

Baafi, Peter Oppong. "Tools For Cyber Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 285–90. http://dx.doi.org/10.22624/aims/crp-bk3-p46.

Full text
Abstract:
Digital Forensics & Cyber Security Graduate Programme Department Of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana E-mails: peeuncle3@gmail.com Phone: +233242776968 ABSTRACT Digital forensics, or Cyber security, has become a vital part of almost every research, and digital forensics tools' users are becoming more diverse in their backgrounds and interests. As a result, usability is an important section of these tools. This paper investigates the usability aspect of forensics tools. The study results highlight several usability issues that need to be considered when designing and implementing digital forensics tools. Cyber-attacks are fast-moving and surging in number and severity. When the attacks occur, the attacked enterprise responds with predetermined actions. Applying digital forensics helps in recovering and investigating material on digital media and networks is one of these actions. Cyber Forensic Investigation includes the Capture and Analysis of digital data either to prove or disprove whether the internet-related theft has been committed or not. Earlier, Computers were used only to store large volumes of data and perform many operations on them, but nowadays, it has expanded and occupied a prior role in Crime Investigation. To solve these cyber-related problems, the selection and usage of Forensic tools are essential. The developers have created many cyber forensic tools for better research and quick investigation. Cop departments and investigation agencies select the tools based on various factors, including budget and available experts on the team. This paper describes the different types of existing computer forensic tools and their usage. The article gives detailed information on all related works by other scholars in the area of this paper. Keywords: Digital Forensics; Forensics, GUI, User Interface, Digital Forensics, and its framework, Cyber forensics tools. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Peter Oppong Baafi (2022): Toosl For Cyber Forensics Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 285-290 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P46
APA, Harvard, Vancouver, ISO, and other styles
10

Premanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.

Full text
Abstract:
Digital forensics is a rapidly evolving field that plays a critical role in investigating cybercrime, data breaches, and illicit activities across various domains, including blockchain, cryptocurrency, and the dark web. This paper explores key areas of digital forensics, including computer forensics, mobile forensics, network forensics, cloud forensics, IoT forensics, and embedded system forensics. Emerging trends such as drone and satellite forensics highlight the increasing scope of forensic investigations beyond traditional computing environments. Additionally, the study delves into blockchain forensics, which focuses on tracing cryptocurrency transactions to combat money laundering, ransomware payments, and illicit trading on the dark web. Advanced tools such as Chainalysis, Maltego, and SpiderFoot are employed in forensic methodologies to track digital evidence effectively. The paper also addresses challenges such as encryption, data volatility, jurisdictional barriers, and anti-forensics techniques used by cybercriminals. Legal and compliance issues, including GDPR, HIPAA, and ISO 27037, are also discussed in the context of admissibility and cross-border investigations. By analyzing real-world case studies—including the Silk Road takedown, Sony Pictures hack, and AlphaBay shutdown—this paper provides insight into the role of forensic experts in digital investigations. With advancements in artificial intelligence and machine learning, digital forensics continues to evolve, offering law enforcement and cybersecurity professionals new techniques to trace digital footprints and counter cyber threats effectively.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Digital and Computer Forensics"

1

Watson, Michael Charles. "Certifying Computer Forensics Skills." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9131.

Full text
Abstract:
Computer forensics is an ever-growing technological field of complexity and depth. Individuals must strive to keep learning and growing their skills as they help combat cybercrime throughout the world. This study attempts to establish a method of evaluating conceptual expertise in computer forensics to help indicate whether or not an individual understands the five basic phases of computer forensics: preparation, seizure of evidence, acquisition of data, analysis of data, and reporting the findings of the analysis. A survey was presented to a university class of 30 students taking a computer forensics course and as well as posted online asking computer forensics professionals to participate in the survey. Results show that novices that were enrolled in a computer forensics course were able to identify the phases of computer forensics more readily than professionals
APA, Harvard, Vancouver, ISO, and other styles
2

Al, Fahdi Mahmood. "Automated digital forensics and computer crime profiling." Thesis, University of Plymouth, 2016. http://hdl.handle.net/10026.1/8090.

Full text
Abstract:
Over the past two decades, technology has developed tremendously, at an almost exponential rate. While this development has served the nation in numerous different positive ways, negatives have also emerged. One such negative is that of computer crime. This criminality has even grown so fast as to leave current digital forensic tools lagging behind in terms of development, and capabilities to manage such increasing and sophisticated types of crime. In essence the time taken to analyse a case is huge and increasing, and cases are not fully or properly investigated. This results in an ever-increasing number of pending and unsolved cases pertaining to computer crime. Digital forensics has become an essential tool in the fight against computer crime, providing both procedures and tools for the acquisition, examination and analysis of digital evidence. However, the use of technology is expanding at an ever-increasing rate, with the number of devices a single user might engage with increasing from a single device to 3 or more, the data capacity of those devices reaching far into the Terabytes, and the nature of the underlying technology evolving (for example, the use of cloud services). This results in an incredible challenge for forensic examiners to process and analyse cases in an efficient and effective manner. This thesis focuses upon the examination and analysis phases of the investigative process and considers whether automation of the process is possible. The investigation begins with researching the current state of the art, and illustrates a wide range of challenges that are facing the digital forensics investigators when analysing a case. Supported by a survey of forensic researchers and practitioners, key challenges were identified and prioritised. It was found that 95% of participants believed that the number of forensic investigations would increase in the coming times, with 75% of participants believing that the time consumed in such cases would increase. With regards to the digital forensic sophistication, 95% of the participants expected a rise in the complexity level and sophistication of digital forensics. To this end, an automated intelligent system that could be used to reduce the investigator’s time and cognitive load was found to be a promising solution. A series of experiments are devised around the use of Self-Organising Maps (SOMs) – a technique well known for unsupervised clustering of objects. The analysis is performed on a range of file system and application-level objects (e.g. email, internet activity) across four forensic cases. Experiment evaluations revealed SOMs are able to successfully cluster forensic artefacts from the remaining files. Having established SOMs are capable of clustering wanted artefacts from the case, a novel algorithm referred to as the Automated Evidence Profiler (AEP), is proposed to encapsulate the process and provide further refinement of the artefact identification process. The algorithm led to achieving identification rates in examined cases of 100% in two cases and 94% in a third. A novel architecture is proposed to support the algorithm in an operational capacity – considering standard forensic techniques such as hashing for known files, file signature analysis, application-level analysis. This provides a mechanism that is capable of utilising the A E P with several other components that are able to filter, prioritise and visualise artefacts of interest to investigator. The approach, known as Automated Forensic Examiner (AFE), is capable of identifying potential evidence in a more efficient and effective manner. The approach was evaluated by a number of experts in the field, and it was unanimously agreed that the chosen research problem was one with great validity. Further to this, the experts all showed support for the Automated Forensic Examiner based on the results of cases analysed.
APA, Harvard, Vancouver, ISO, and other styles
3

Altiero, Roberto A. "Digital Forensics Tool Interface Visualization." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/24.

Full text
Abstract:
Recent trends show digital devices utilized with increasing frequency in most crimes committed. Investigating crime involving these devices is labor-intensive for the practitioner applying digital forensics tools that present possible evidence with results displayed in tabular lists for manual review. This research investigates how enhanced digital forensics tool interface visualization techniques can be shown to improve the investigator's cognitive capacities to discover criminal evidence more efficiently. This paper presents visualization graphs and contrasts their properties with the outputs of The Sleuth Kit (TSK) digital forensic program. Exhibited is the textual-based interface proving the effectiveness of enhanced data presentation. Further demonstrated is the potential of the computer interface to present to the digital forensic practitioner an abstract, graphic view of an entire dataset of computer files. Enhanced interface design of digital forensic tools means more rapidly linking suspicious evidence to a perpetrator. Introduced in this study is a mixed methodology of ethnography and cognitive load measures. Ethnographically defined tasks developed from the interviews of digital forensics subject matter experts (SME) shape the context for cognitive measures. Cognitive load testing of digital forensics first-responders utilizing both a textual-based and visualized-based application established a quantitative mean of the mental workload during operation of the applications under test. A t-test correlating the dependent samples' mean tested for the null hypothesis of less than a significant value between the applications' comparative workloads of the operators. Results of the study indicate a significant value, affirming the hypothesis that a visualized application would reduce the cognitive workload of the first-responder analyst. With the supported hypothesis, this work contributes to the body of knowledge by validating a method of measurement and by providing empirical evidence that the use of the visualized digital forensics interface will provide a more efficient performance by the analyst, saving labor costs and compressing time required for the discovery phase of a digital investigation.
APA, Harvard, Vancouver, ISO, and other styles
4

Fei, Bennie Kar Leung. "Data visualisation in digital forensics." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-03072007-153241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Etow, Tambue Ramine. "IMPACT OF ANTI-FORENSICS TECHNIQUES ON DIGITAL FORENSICS INVESTIGATION." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97116.

Full text
Abstract:
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly because forensic investigations are based on artifacts left oncomputers and other digital devices. In recent times, perpetrators of computer crimesare getting abreast of the digital forensics dynamics hence, capacitated to use someanti-forensics measures and techniques to obfuscate the investigation processes.Incases where such techniques are employed, it becomes extremely difficult, expensive and time consuming to carry out an effective investigation. This might causea digital forensics expert to abandon the investigation in a pessimistic manner.ThisProject work serves to practically demonstrate how numerous anti-forensics can bedeployed by the criminals to derail the smooth processes of digital forensic investigation with main focus on data hiding and encryption techniques, later a comparativestudy of the effectiveness of some selected digital forensics tools in analyzing andreporting shreds of evidence will be conducted.
APA, Harvard, Vancouver, ISO, and other styles
6

Flory, Christopher M. "Digital forensics and community supervision| Making a case for field based digital forensics training." Thesis, Purdue University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1597627.

Full text
Abstract:
<p>In this paper I will review the literature concerning investigator digital forensics models and how they apply to field investigators. A brief history of community supervision and how offenders are supervised will be established. I will also cover the difference between community supervision standards and police standards concerning searches, evidence, standards of proof, and the difference between parole boards and courts. Currently, the burden for digital forensics for community supervision officers is placed on local or state law enforcement offices, with personnel trained in forensics, but may not place a high priority on outside cases. Forensic field training for community supervision officers could ease the caseloads of outside forensic specialists, and increase fiscal responsible by increasing efficiency and public safety in the field of community supervision. </p>
APA, Harvard, Vancouver, ISO, and other styles
7

Marziale, Lodovico. "Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.

Full text
Abstract:
Digital forensics is the science concerned with discovering, preserving, and analyzing evidence on digital devices. The intent is to be able to determine what events have taken place, when they occurred, who performed them, and how they were performed. In order for an investigation to be effective, it must exhibit several characteristics. The results produced must be reliable, or else the theory of events based on the results will be flawed. The investigation must be comprehensive, meaning that it must analyze all targets which may contain evidence of forensic interest. Since any investigation must be performed within the constraints of available time, storage, manpower, and computation, investigative techniques must be efficient. Finally, an investigation must provide a coherent view of the events under question using the evidence gathered. Unfortunately the set of currently available tools and techniques used in digital forensic investigations does a poor job of supporting these characteristics. Many tools used contain bugs which generate inaccurate results; there are many types of devices and data for which no analysis techniques exist; most existing tools are woefully inefficient, failing to take advantage of modern hardware; and the task of aggregating data into a coherent picture of events is largely left to the investigator to perform manually. To remedy this situation, we developed a set of techniques to facilitate more effective investigations. To improve reliability, we developed the Forensic Discovery Auditing Module, a mechanism for auditing and enforcing controls on accesses to evidence. To improve comprehensiveness, we developed ramparser, a tool for deep parsing of Linux RAM images, which provides previously inaccessible data on the live state of a machine. To improve efficiency, we developed a set of performance optimizations, and applied them to the Scalpel file carver, creating order of magnitude improvements to processing speed and storage requirements. Last, to facilitate more coherent investigations, we developed the Forensic Automated Coherence Engine, which generates a high-level view of a system from the data generated by low-level forensics tools. Together, these techniques significantly improve the effectiveness of digital forensic investigations conducted using them.
APA, Harvard, Vancouver, ISO, and other styles
8

Samsuddin, Samsuddin Wira Bin Tu Manghui. "Digital forensics curriculum for undergraduate and master graduate students." [Cedar City, Utah] : Southern Utah University, 2009. http://unicorn.li.suu.edu/ScholarArchive/ForensicScience/SamsuddinWira.pdf.

Full text
Abstract:
Thesis (M.S.)--Southern Utah University, 2009.<br>Title from PDF title page. "Thesis presented to the faculty of the Graduate School of Southern Utah University in partial fulfillment of the requirements for the degree of Master of Science in Forensic Science, Computer Forensics Emphasis." Manghui Tu, Advisor. Includes bibliographical references (p. 83-88).
APA, Harvard, Vancouver, ISO, and other styles
9

Schatz, Bradley Lawrence. "Digital evidence : representation and assurance." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16507/1/Bradley_Schatz_Thesis.pdf.

Full text
Abstract:
The field of digital forensics is concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. The complexity of such digital evidence is constantly increasing, as is the volume of data which might contain evidence. Current approaches to interpreting and assuring digital evidence rely implicitly on the use of tools and representations made by experts in addressing the concerns of juries and courts. Current forensics tools are best characterised as not easily verifiable, lacking in ease of interoperability, and burdensome on human process. The tool-centric focus of current digital forensics practise impedes access to and transparency of the information represented within digital evidence as much as it assists, by nature of the tight binding between a particular tool and the information that it conveys. We hypothesise that a general and formal representational approach will benefit digital forensics by enabling higher degrees of machine interpretation, facilitating improvements in tool interoperability and validation. Additionally, such an approach will increase human readability. This dissertation summarises research which examines at a fundamental level the nature of digital evidence and digital investigation, in order that improved techniques which address investigation efficiency and assurance of evidence might be identified. The work follows three themes related to this: representation, analysis techniques, and information assurance. The first set of results describes the application of a general purpose representational formalism towards representing diverse information implicit in event based evidence, as well as domain knowledge, and investigator hypotheses. This representational approach is used as the foundation of a novel analysis technique which uses a knowledge based approach to correlate related events into higher level events, which correspond to situations of forensic interest. The second set of results explores how digital forensic acquisition tools scale and interoperate, while assuring evidence quality. An improved architecture is proposed for storing digital evidence, analysis results and investigation documentation in a manner that supports arbitrary composition into a larger corpus of evidence. The final set of results focus on assuring the reliability of evidence. In particular, these results focus on assuring that timestamps, which are pervasive in digital evidence, can be reliably interpreted to a real world time. Empirical results are presented which demonstrate how simple assumptions cannot be made about computer clock behaviour. A novel analysis technique for inferring the temporal behaviour of a computer clock is proposed and evaluated.
APA, Harvard, Vancouver, ISO, and other styles
10

Schatz, Bradley Lawrence. "Digital evidence : representation and assurance." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16507/.

Full text
Abstract:
The field of digital forensics is concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. The complexity of such digital evidence is constantly increasing, as is the volume of data which might contain evidence. Current approaches to interpreting and assuring digital evidence rely implicitly on the use of tools and representations made by experts in addressing the concerns of juries and courts. Current forensics tools are best characterised as not easily verifiable, lacking in ease of interoperability, and burdensome on human process. The tool-centric focus of current digital forensics practise impedes access to and transparency of the information represented within digital evidence as much as it assists, by nature of the tight binding between a particular tool and the information that it conveys. We hypothesise that a general and formal representational approach will benefit digital forensics by enabling higher degrees of machine interpretation, facilitating improvements in tool interoperability and validation. Additionally, such an approach will increase human readability. This dissertation summarises research which examines at a fundamental level the nature of digital evidence and digital investigation, in order that improved techniques which address investigation efficiency and assurance of evidence might be identified. The work follows three themes related to this: representation, analysis techniques, and information assurance. The first set of results describes the application of a general purpose representational formalism towards representing diverse information implicit in event based evidence, as well as domain knowledge, and investigator hypotheses. This representational approach is used as the foundation of a novel analysis technique which uses a knowledge based approach to correlate related events into higher level events, which correspond to situations of forensic interest. The second set of results explores how digital forensic acquisition tools scale and interoperate, while assuring evidence quality. An improved architecture is proposed for storing digital evidence, analysis results and investigation documentation in a manner that supports arbitrary composition into a larger corpus of evidence. The final set of results focus on assuring the reliability of evidence. In particular, these results focus on assuring that timestamps, which are pervasive in digital evidence, can be reliably interpreted to a real world time. Empirical results are presented which demonstrate how simple assumptions cannot be made about computer clock behaviour. A novel analysis technique for inferring the temporal behaviour of a computer clock is proposed and evaluated.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Digital and Computer Forensics"

1

Bodden, Valerie. Digital forensics. Creative Education, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eoghan, Casey, and Aquilina James M, eds. Malware forensics field guide for Windows systems: Digital forensics field guides. Syngress, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

service), ScienceDirect (Online, ed. Handbook of digital forensics and investigation. Academic, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Institute, Pennsylvania Bar. Digital forensics in civil litigation. Pennsylvania Bar Institute, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Richard, Bejtlich, and Rose Curtis W, eds. Real digital forensics: Computer security and incident response. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

A, Carvey Harlan, ed. Digital forensics with open source tools. Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Altheide, Cory. Digital forensics with open source tools. Edited by Carvey Harlan A. Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kruse, Warren G. Computer forensics: Incident response essentials. Addison-Wesley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schperberg, Robert. Cybercrime: Incident response and digital forensics. Information Systems Audit and Control Association, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

G, Heiser Jay, ed. Computer forensics: Incident response essentials. Addison-Wesley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Digital and Computer Forensics"

1

Hamm, Jeff. "Computer Forensics." In Digital Forensics. John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781119262442.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hassan, Nihad A. "Computer Forensics Lab Requirements." In Digital Forensics Basics. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-3838-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kävrestad, Joakim. "Computer Theory." In Fundamentals of Digital Forensics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96319-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kävrestad, Joakim. "Computer Theory." In Fundamentals of Digital Forensics. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kävrestad, Joakim. "Computer Theory." In Guide to Digital Forensics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67450-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. "Computer Hackers and Hacking." In Cybercrime and Digital Forensics. Routledge, 2017. http://dx.doi.org/10.4324/9781315296975-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hsieh, Raymond J. "Digital evidence and computer forensics." In Introduction to Forensic Science and Criminalistics. CRC Press, 2019. http://dx.doi.org/10.4324/9781315119175-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moustafa, Nour. "Digital Forensics and Computer Foundations." In Digital Forensics in the Era of Artificial Intelligence. CRC Press, 2022. http://dx.doi.org/10.1201/9781003278962-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kävrestad, Joakim, Marcus Birath, and Nathan Clarke. "What Is Digital Forensics?" In Texts in Computer Science. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-53649-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. "Malware and Automated Computer Attacks." In Cybercrime and Digital Forensics. Routledge, 2017. http://dx.doi.org/10.4324/9781315296975-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital and Computer Forensics"

1

Khadka, Sujan, Roshan Singh, Masrath Begum, Osama Muhammad, Bushra Naeem, and Saman Shojae Chaeikar. "A Review on Computer Crimes and Digital Forensics." In 2024 IEEE Consumer Life Tech (ICLT). IEEE, 2024. https://doi.org/10.1109/iclt63507.2024.11038544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Agarwal, Gaurav, Rahul Bhatt, Paresh Pathak, Ashwani Kumar, Anup Kumar, and Sakshi Pandey. "Digital Forensics and the Law: A Computer Engineering Perspective." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Patsiouras, Emmanouil, Stavros Kyriakou Vasileiou, Sotirios Papadopoulos, et al. "Integrating AI and Computer Vision for Ballistic and Bloodstain Analysis in 3D Digital Forensics." In 2024 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering (MetroXRAINE). IEEE, 2024. https://doi.org/10.1109/metroxraine62247.2024.10796512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oyelakin, Oyetunji, Abel Ofori-Yeboah, Aishat Ganiyu, and Oluwole Oguntoyinbo. "Digital Forensics Investigations and Network Security Issues in Tracking the Trails of Cybercriminals." In 2024 International Conference on Electrical and Computer Engineering Researches (ICECER). IEEE, 2024. https://doi.org/10.1109/icecer62944.2024.10920466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Zhijun, Ye Tian, Yan Li, and Hong Guo. "Exploring digital forensics and security through authenticity verification for DingTalk-based communications." In Seventh International Conference on Advanced Electronic Materials, Computers, and Software Engineering (AEMCSE 2024), edited by Lvqing Yang. SPIE, 2024. http://dx.doi.org/10.1117/12.3038444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ramkumar, G., K. Pithamber, C. H. Srilakshmi, S. Rathika, B. Anni Princy, and Vijay Anand Kandaswamy. "Innovations in Image Forensics: Designing a Smart Learning Based Methodology for Forgery Detection over Digital Images." In 2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT). IEEE, 2024. http://dx.doi.org/10.1109/ic2sdt62152.2024.10696377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bardhan, Rajon, Raymond Garay-Paravisini, Gokila Dorai, and Logan Vanputte. "Digital Forensics Analysis of a Financial Mobile Application: Uncovering Security and Privacy Implications." In 2024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2024. http://dx.doi.org/10.1109/isncc62547.2024.10758975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Peisert, Sean, Matt Bishop, and Keith Marzullo. "Computer Forensics in Forensis." In 2008 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2008. http://dx.doi.org/10.1109/sadfe.2008.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Kumar Shanu, Annie Irfan, and Neelam Dayal. "Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sayeed, Yahya, and Mehrdad S. Sharbaf. "Investigation of Digital Forensics Tools Validation." In 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE). IEEE, 2023. http://dx.doi.org/10.1109/csce60160.2023.00393.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Digital and Computer Forensics"

1

Liebrock, Lorie M., and David Patrick Duggan. Parallel digital forensics infrastructure. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/1001002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

John, Jeremy Leighton. Digital Forensics and Preservation. Digital Preservation Coalition, 2012. http://dx.doi.org/10.7207/twr12-03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nolan, Richard, Colin O'Sullivan, Jake Branson, and Cal Waits. First Responders Guide to Computer Forensics. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada443483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nolan, Richard, Marie Baker, Jake Branson, et al. First Responders Guide to Computer Forensics: Advanced Topics. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada443137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lyle, Jame R., Douglas R. White, and Richard P. Ayers. Digital forensics at the National Institute of Standards and Technology. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.ir.7490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Salfati, Eran, and Michael Pease. Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT). National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Yulei. Computer-Aided Diagnosis of Digital Mammograms. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada396524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Yulei. Computer-Aided Diagnosis of Digital Mammograms. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada431258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jiang, Yulei. Computer-Aided Diagnosis of Digital Mammograms. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada421590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chan, Heang P. Digital Mammography: Advanced Computer-Aided Breast Cancer Diagnosis. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada420159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography