Academic literature on the topic 'Digital Forensic investigations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital Forensic investigations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Digital Forensic investigations"
Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (April 2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.
Full textSabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.
Full textFerguson, R. I., Karen Renaud, Sara Wilford, and Alastair Irons. "PRECEPT: a framework for ethical digital forensics investigations." Journal of Intellectual Capital 21, no. 2 (March 9, 2020): 257–90. http://dx.doi.org/10.1108/jic-05-2019-0097.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textJiang, Jian Guo, Bo Yang, Sen Lin, Ming Xing Zhang, and Kun Ying Liu. "A Practical Approach for Digital Forensic Triage." Applied Mechanics and Materials 742 (March 2015): 437–44. http://dx.doi.org/10.4028/www.scientific.net/amm.742.437.
Full textZav’yalova, D. V. "Current Capacities of Digital Forensics for Investigations of Different Types of Crimes." Theory and Practice of Forensic Science 15, no. 3 (October 23, 2020): 89–97. http://dx.doi.org/10.30764/1819-2785-2020-3-89-97.
Full textKarabiyik, Umit, and Tugba Karabiyik. "A Game Theoretic Approach for Digital Forensic Tool Selection †." Mathematics 8, no. 5 (May 12, 2020): 774. http://dx.doi.org/10.3390/math8050774.
Full textMontasari, Reza, Richard Hill, Simon Parkinson, Pekka Peltola, Amin Hosseinian-Far, and Alireza Daneshkhah. "Digital Forensics." International Journal of Organizational and Collective Intelligence 10, no. 2 (April 2020): 37–53. http://dx.doi.org/10.4018/ijoci.2020040103.
Full textLi, Xiu Zhi, Bao Ling Qin, Huan Qiu, and Song Min Jia. "Sparse Lp-Norm Based ICP for 3D Registration." Applied Mechanics and Materials 742 (March 2015): 433–36. http://dx.doi.org/10.4028/www.scientific.net/amm.742.433.
Full textNortje, Jacobus Gerhardus, and Daniel Christoffel Myburgh. "The Search and Seizure of Digital Evidence by Forensic Investigators in South Africa." Potchefstroom Electronic Law Journal 22 (April 25, 2019): 1–42. http://dx.doi.org/10.17159/1727-3781/2019/v22i0a4886.
Full textDissertations / Theses on the topic "Digital Forensic investigations"
Marziale, Lodovico. "Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.
Full textDe, Souza Pedro. "A Chain of findings for digital investigations." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/40842.
Full textDissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Hansen, Tone. "A Digital Tool to Improve the Efficiency of IT Forensic Investigations." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40232.
Full textPatterson, Farrah M. "The implications of virtual environments in digital forensic investigations." Master's thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4819.
Full textID: 030646240; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (M.S.)--University of Central Florida, 2011.; Includes bibliographical references (p. 46).
M.S.
Masters
Computer Science
Engineering and Computer Science
Digital Forensics; Science/Computing Track
Liljekvist, Erika, and Oscar Hedlund. "Uncovering Signal : Simplifying Forensic Investigations of the Signal Application." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44835.
Full textHargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.
Full textHargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.
Full textRoussel, Bruno. "Les investigations numériques en procédure pénale." Thesis, Bordeaux, 2020. http://www.theses.fr/2020BORD0075.
Full textDigitalization has more effects on our society. So, the criminal inquiry must be adapted in order to include digital investigations. Those investigations allow accessing, gathering and creating data. In the current state of criminal proceedings in France, the digital information manipulated during investigative acts is separated, which undermines the efficiency of their exploitation as well as the protection of data subjects ' rights. This study proposes an approach that allows the analysis of all the digital information collected during a procedure, grouped, for better exploitation. Moreover, a lot of legal processing of personal data exist in France. Data recorded in those files are divided, and the same data is stored in many judicial files. Our work studies the possibility to aggregate some of the identical data, like identification or address in order to improve criminal proceedings
Montasari, Reza. "The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice." Thesis, University of Derby, 2016. http://hdl.handle.net/10545/620799.
Full textSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Full textBooks on the topic "Digital Forensic investigations"
Le-Khac, Nhien-An, and Kim-Kwang Raymond Choo, eds. Cyber and Digital Forensic Investigations. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47131-6.
Full textComputer crimes and digital investigations. New York: Oxford University Press, 2007.
Find full textMuda, Azah Kamilah, Yun-Huoy Choo, Ajith Abraham, and Sargur N. Srihari, eds. Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05885-6.
Full textDigital forensics: Digital evidence in criminal investigation. Chichester: Wiley-Blackwell, 2008.
Find full textGregory, Kipper, and ScienceDirect (Online service), eds. Virtualization and forensics: A digital forensic investigator's guide to virtual environments. Amsterdam: Syngress/Elsevier, 2010.
Find full textMark, Pollitt, and Shenoi Sujeet, eds. Advances in digital forensics: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2006. New York: Springer, 2005.
Find full textservice), ScienceDirect (Online, ed. Handbook of digital forensics and investigation. London: Academic, 2010.
Find full textAdvances in digital forensics II: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 29-February 1, 2006. New York: Springer, 2006.
Find full textPhilip, Craiger, and Shenoi Sujeet, eds. Advances in digital forensics III: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007. New York, NY: Springer, 2007.
Find full textBook chapters on the topic "Digital Forensic investigations"
Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. "Legal Challenges in Digital Forensic Investigations." In Cybercrime and Digital Forensics, 571–621. Second edition. | Abingdon, Oxon ; New York, NY : Routledge, 2018.: Routledge, 2017. http://dx.doi.org/10.4324/9781315296975-14.
Full textTanner, April, and David Dampier. "Concept Mapping for Digital Forensic Investigations." In Advances in Digital Forensics V, 291–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04155-6_22.
Full textOverill, Richard, and Kam-Pui Chow. "Measuring Evidential Weight in Digital Forensic Investigations." In Advances in Digital Forensics XIV, 3–10. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99277-8_1.
Full textO’Shaughnessy, Stephen, and Anthony Keane. "Impact of Cloud Computing on Digital Forensic Investigations." In Advances in Digital Forensics IX, 291–303. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41148-9_20.
Full textvan Staden, Wynand. "Protecting Third Party Privacy in Digital Forensic Investigations." In Advances in Digital Forensics IX, 19–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41148-9_2.
Full textOverill, Richard, Michael Kwan, Kam-Pui Chow, Pierre Lai, and Frank Law. "A Cost-Effective Model for Digital Forensic Investigations." In Advances in Digital Forensics V, 231–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04155-6_17.
Full textYang, Min, and Kam-Pui Chow. "AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS." In IFIP Advances in Information and Communication Technology, 61–76. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24123-4_4.
Full textKwan, Michael, Richard Overill, Kam-Pui Chow, Hayson Tse, Frank Law, and Pierre Lai. "Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations." In Advances in Digital Forensics VII, 231–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24212-0_18.
Full textBednar, P. M., and V. Katos. "Digital Forensic Investigations: A New Frontier for Informing Systems." In Information Systems: People, Organizations, Institutions, and Technologies, 361–71. Heidelberg: Physica-Verlag HD, 2009. http://dx.doi.org/10.1007/978-3-7908-2148-2_42.
Full textVerma, Robin, Jayaprakash Govindaraj, and Gaurav Gupta. "Data Privacy Perceptions About Digital Forensic Investigations in India." In IFIP Advances in Information and Communication Technology, 25–45. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46279-0_2.
Full textConference papers on the topic "Digital Forensic investigations"
Bakhshi, Taimur. "Forensic of Things: Revisiting Digital Forensic Investigations in Internet of Things." In 2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST). IEEE, 2019. http://dx.doi.org/10.1109/iceest48626.2019.8981675.
Full textBiggs, S., and S. Vidalis. "Cloud Computing: The impact on digital forensic investigations." In 2009 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009). IEEE, 2009. http://dx.doi.org/10.1109/icitst.2009.5402561.
Full textCharles, T., and M. Pollock. "Digital forensic investigations at universities in South Africa." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435506.
Full textHorsman, Graeme, Christopher Laing, and Paul Vickers. "User-Contributory Case-Based Reasoning for Digital Forensic Investigations." In 2012 Third International Conference on Emerging Security Technologies (EST). IEEE, 2012. http://dx.doi.org/10.1109/est.2012.35.
Full textMcDonald, Jeffrey Todd, Ramya Manikyam, William Bradley Glisson, Todd R. Andel, and Yuan Xiang Gu. "Enhanced Operating System Protection to Support Digital Forensic Investigations." In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. http://dx.doi.org/10.1109/trustcom/bigdatase/icess.2017.296.
Full textBirk, Dominik, and Christoph Wegener. "Technical Issues of Forensic Investigations in Cloud Computing Environments." In 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2011. http://dx.doi.org/10.1109/sadfe.2011.17.
Full textTanner, April, David Dampier, and Jim Thompson. "On developing a conceptual modeling report management tool for digital forensic investigations." In 2012 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2012. http://dx.doi.org/10.1109/ths.2012.6459890.
Full textMilagre, José, and Marcelo Caiado. "Cloud Computing Forensics. Best Practice and Challenges for Process Efficiency of Investigations and Digital Forensics." In The Eighth International Conference on Forensic Computer Science. Abeat, 2013. http://dx.doi.org/10.5769/c2013003.
Full textHorsman, Graeme, Christopher Laing, and Paul Vickers. "A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.18.
Full textmaheswari, K. Uma, and G. Shobana. "The State of the art tools and techniques for remote digital forensic investigations." In 2021 3rd International Conference on Signal Processing and Communication (ICPSC). IEEE, 2021. http://dx.doi.org/10.1109/icspc51351.2021.9451718.
Full textReports on the topic "Digital Forensic investigations"
Nic Daeid, Niamh, Heather Doran, Lucina Hackman, and Pauline Mack. The Curse of the Burial Dagger Teacher Materials. University of Dundee, September 2021. http://dx.doi.org/10.20933/100001220.
Full text