Academic literature on the topic 'Digital forensic analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital forensic analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Digital forensic analysis"
Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Full textSabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.
Full textJafari, Fakeeha, and Rabail Shafique Satti. "Comparative Analysis of Digital Forensic Models." Journal of Advances in Computer Networks 3, no. 1 (2015): 82–86. http://dx.doi.org/10.7763/jacn.2015.v3.146.
Full textHikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (January 7, 2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Full textFaiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (March 30, 2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Full textZuhriyanto, Ikhsan, Anton Yudhana, and Imam Riadi. "Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 5 (October 30, 2020): 829–36. http://dx.doi.org/10.29207/resti.v4i5.2152.
Full textVadlamudi, Divya, Dr K. Thirupathi Rao, Pellakuri Vidyullatha, and B. AjasekharReddy. "Analysis on digital forensics challenges and anti-forensics techniques in cloud computing." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 1072. http://dx.doi.org/10.14419/ijet.v7i2.7.12230.
Full textLee, Jae-Ung, and Woo-Young Soh. "Comparative analysis on integrated digital forensic tools for digital forensic investigation." IOP Conference Series: Materials Science and Engineering 834 (June 23, 2020): 012034. http://dx.doi.org/10.1088/1757-899x/834/1/012034.
Full textDissertations / Theses on the topic "Digital forensic analysis"
Hales, Gavin. "Assisting digital forensic analysis via exploratory information visualisation." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113.
Full textNelson, Alexander J. "Software signature derivation from sequential digital forensic analysis." Thesis, University of California, Santa Cruz, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10140317.
Full textHierarchical storage system namespaces are notorious for their immense size, which is a significant hindrance for any computer inspection. File systems for computers start with tens of thousands of files, and the Registries of Windows computers start with hundreds of thousands of cells. An analysis of a storage system, whether for digital forensics or locating old data, depends on being able to reduce the namespaces down to the features of interest. Typically, having such large volumes to analyze is seen as a challenge to identifying relevant content. However, if the origins of files can be identified—particularly dividing between software and human origins—large counts of files become a boon to profiling how a computer has been used. It becomes possible to identify software that has influenced the computer's state, which gives an important overview of storage system contents not available to date.
In this work, I apply document search to observed changes in a class of forensic artifact, cell names of the Windows Registry, to identify effects of software on storage systems. Using the search model, a system's Registry becomes a query for matching software signatures. To derive signatures, file system differential analysis is extended from between two storage system states to many sequences of states. The workflow that creates these signatures is an example of analytics on data lineage, from branching data histories. The signatures independently indicate past presence or usage of software, based on consistent creation of measurably distinct artifacts. A signature search engine is demonstrated against a machine with a selected set of applications installed and executed. The optimal search engine according to that machine is then turned against a separate corpus of machines with a set of present applications identified by several non-Registry forensic artifact sources, including the file systems, memory, and network captures. The signature search engine corroborates those findings, using only the Windows Registry.
Ovens, Kenneth Martin. "Digital forensic analysis of communication applications on Apple iOS devices." Thesis, Glasgow Caledonian University, 2017. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.743916.
Full textNaru, Amar Singh. "Digital image analysis of the human bite mark." Thesis, University of Hertfordshire, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338566.
Full textNecaise, Nathan Joseph. "Empirical analysis of disk sector prefixes for digital forensics." Master's thesis, Mississippi State : Mississippi State University, 2007. http://library.msstate.edu/etd/show.asp?etd=etd-03282007-151218.
Full textLidström, Robbin, and Elfving Elfving. "An exploratory forensic analysis of the Xbox One S All Digital." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42511.
Full textChabot, Yoan. "Construction, enrichment and semantic analysis of timelines : application to digital forensics." Thesis, Dijon, 2015. http://www.theses.fr/2015DIJOS037/document.
Full textHaving a clear view of events that occurred over time is a difficult objective to achieve in digital investigations (DI). Event reconstruction, which allows investigators to build and to understand the timeline of an incident, is one of the most important steps of a DI process. The complete understanding of an incident and its circumstances requires on the one hand to associate each piece of information to its meaning, and on the other hand to identify semantic relationships between these fragments. This complex task requires the exploration of a large and heterogeneous amount of information found on the crime scene. Therefore, investigators encounter cognitive overload problems when processing this data, causing them to make mistakes or omit information that could have a high added value for the progress of the investigation. In addition, any result produced by the reconstruction process must meet several legal requirements to be admissible at trial, including the ability to explain how the results were produced. To help the investigators to deal with these problems, this thesis introduces a semantic-based approach called SADFC. The main objective of this approach is to provide investigators with tools to help them find the meaning of the entities composing the crime scene and understand the relationships linking these entities, while respecting the legal requirements. To achieve this goal, SADFC is composed of two elements. First, SADFC is based on theoretical foundations, ensuring the credibility of the results produced by the tools via a formal and rigorous definition of the processes used. This approach then proposes an architecture centered on an ontology to model and structure the knowledge inherent to an incident and to assist the investigator in the analysis of this knowledge. The relevance and the effectiveness of this architecture are demonstrated through a case study describing a fictitious investigation
Wang, Mengmeng, and 王萌萌. "Temporal analysis on HFS+ and across file systems in digital forensic investigation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B50900122.
Full textpublished_or_final_version
Computer Science
Master
Master of Philosophy
Shakir, Amer, Muhammad Hammad, and Muhammad Kamran. "Comparative Analysis & Study of Android/iOS MobileForensics Tools." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44797.
Full textThompson, Marcus A. "An exploratory forensic acquisition and analysis of digital evidence on the Amazon Kindle." Thesis, Purdue University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1565358.
Full textThe Amazon Kindle is becoming a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various types of files a typical user may introduce using one method, the USB interface. The Kindle was forensically imaged with AccessData's Forensic Toolkit Imager before and after each Kindle was populated. Each file was deleted through the USB interface. Files were retrieved and recovered through the USB interface before and after file deletion. These two sets of files were compared to the original set of files. All files retrieved before deletion matched their original counterpart. Not all files recovered after deletion matched their original counterpart. These steps and procedures followed a similar methodology developed by Leshney (2008) for virtual machines.
Books on the topic "Digital forensic analysis"
Windows registry forensics: Advanced digital forensic analysis of the Windows registry. Burlington, MA: Syngress, 2011.
Find full textBennett, Matthew R., and Marcin Budka. Digital Technology for Forensic Footwear Analysis and Vertebrate Ichnology. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-93689-5.
Full textMichael, Bowers C., ed. Digital analysis of bite mark evidence: Using Adobe Photoshop. Santa Barbara, Calif: Forensic Imaging Services, 2000.
Find full textInternational Workshop on Digital Forensics and Incident Analysis (2nd 2007 Karlovassi, Samos, Greece). Digital forensics and incident analysis: Second International annual Workshop on Digital Forensics and Incident Analysis : proceedings : WDFIA 2007 : 27-28 August, 2007, Karlovassi, Samos, Greece. Los Alamitos, Calif: IEEE Computer Society, 2007.
Find full textInternational, Workshop on Digital Forensics and Incident Analysis (3rd 2008 Malaga Spain). Proceedings: Third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 : Malaga, Spain, 9 October 2008. Los Alamitos, Calif: CPS, Conference Pub. Services, 2008.
Find full textInternational Workshop on Digital Forensics and Incident Analysis (3rd 2008 Malaga, Spain). Proceedings: Third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 : Malaga, Spain, 9 October 2008. Los Alamitos, Calif: CPS, Conference Pub. Services, 2008.
Find full textKirschenbaum, Matthew G. Mechanisms: New media and the forensic imagination. Cambridge, Mass: MIT Press, 2007.
Find full textKatie, Strzempka, ed. iPhone and iOS forensics: Investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices. Waltham, MA: Syngress, 2011.
Find full textSCOTT, Phil. Digital Forensic Analysis of Smart Watches. Independently Published, 2020.
Find full textBook chapters on the topic "Digital forensic analysis"
Conrad, Scott, Greg Dorn, and Philip Craiger. "Forensic Analysis of Plug Computers." In Advances in Digital Forensics VII, 275–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24212-0_21.
Full textBennett, Matthew R., and Marcin Budka. "Forensic Applications." In Digital Technology for Forensic Footwear Analysis and Vertebrate Ichnology, 137–88. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93689-5_5.
Full textAdderley, Nikolai, and Gilbert Peterson. "Interactive Temporal Digital Forensic Event Analysis." In Advances in Digital Forensics XVI, 39–55. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-56223-6_3.
Full textQuick, Darren, and Kim-Kwang Raymond Choo. "Quick Analysis of Digital Forensic Data." In SpringerBriefs on Cyber Security Systems and Networks, 5–28. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0263-3_2.
Full textOlajide, Funminiyi, Tawfik Al-Hadrami, and Anne James-Taylor. "Digital Investigation and Forensic User Analysis." In Advances in Intelligent Systems and Computing, 630–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99007-1_59.
Full textLiu, Changwei, Anoop Singhal, and Duminda Wijesekera. "Identifying Evidence for Cloud Forensic Analysis." In Advances in Digital Forensics XIII, 111–30. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67208-3_7.
Full textChen, Wenhao, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, and Stephanie Reinders. "Forensic Analysis of Android Steganography Apps." In Advances in Digital Forensics XIV, 293–312. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99277-8_16.
Full textDalrymple, Brian E., and E. Jill Smith. "The ApproachDeveloping Enhancement Strategies for Images Intended for Analysis." In Forensic Digital Image Processing, 193–204. Boca Raton, FL : CRC Press, [2018]: CRC Press, 2018. http://dx.doi.org/10.4324/9781351112239-7.
Full textYang, Ying, Kam-Pui Chow, Lucas Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, and Jenny Chen. "Forensic Analysis of Popular Chinese Internet Applications." In Advances in Digital Forensics VI, 285–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15506-2_20.
Full textConrad, Scott, Greg Dorn, and Philip Craiger. "Forensic Analysis of a PlayStation 3 Console." In Advances in Digital Forensics VI, 65–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15506-2_5.
Full textConference papers on the topic "Digital forensic analysis"
Singh, Kumar Shanu, Annie Irfan, and Neelam Dayal. "Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036214.
Full textGupta, Ankita, Shilpi Gupta, and Anu Mehra. "Video authentication in digital forensic." In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7154945.
Full textTchan, Jack. "Forensic analysis of print using digital image analysis." In Electronic Imaging 2003, edited by Bernice E. Rogowitz and Thrasyvoulos N. Pappas. SPIE, 2003. http://dx.doi.org/10.1117/12.477372.
Full textPeisert, Sean, Matt Bishop, Sidney Karin, and Keith Marzullo. "Toward Models for Forensic Analysis." In Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07). IEEE, 2007. http://dx.doi.org/10.1109/sadfe.2007.23.
Full textTjoa, Steven, W. Sabrina Lin, H. Vicky Zhao, and K. J. Ray Liu. "Block Size Forensic Analysis in Digital Images." In 2007 IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/icassp.2007.365987.
Full textHoss, Allyson M., and Doris L. Carver. "Weaving ontologies to support digital forensic analysis." In 2009 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2009. http://dx.doi.org/10.1109/isi.2009.5137303.
Full textAdebayo, Ojeniyi Joseph, Idris Suleiman, Abdulmalik Yunusa Ade, S. O. Ganiyu, and I. O. Alabi. "Digital Forensic analysis for enhancing information security." In 2015 International Conference on Cyberspace (CYBER-Abuja). IEEE, 2015. http://dx.doi.org/10.1109/cyber-abuja.2015.7360517.
Full textNazir, Tahira, Aun Irtaza, Ali Javed, Hafiz Malik, Awais Mehmood, and Marriam Nawaz. "Digital Image Forensic Analysis using Hybrid Features." In 2021 International Conference on Artificial Intelligence (ICAI). IEEE, 2021. http://dx.doi.org/10.1109/icai52203.2021.9445228.
Full textGeddes, Mary, and Pooneh Bagheri Zadeh. "Forensic analysis of private browsing." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 2016. http://dx.doi.org/10.1109/cybersecpods.2016.7502341.
Full textIqbal, A., F. Mahmood, and M. Ekstedt. "An Experimental Forensic Testbed: Attack-based Digital Forensic Analysis of WAMPAC Applications." In Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion (MEDPOWER 2018). Institution of Engineering and Technology, 2018. http://dx.doi.org/10.1049/cp.2018.1917.
Full textReports on the topic "Digital forensic analysis"
Nic Daeid, Niamh, Heather Doran, Lucina Hackman, and Pauline Mack. The Curse of the Burial Dagger Teacher Materials. University of Dundee, September 2021. http://dx.doi.org/10.20933/100001220.
Full text