Dissertations / Theses on the topic 'Digital Forensic investigations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 48 dissertations / theses for your research on the topic 'Digital Forensic investigations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Marziale, Lodovico. "Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.
Full textDe, Souza Pedro. "A Chain of findings for digital investigations." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/40842.
Full textDissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Hansen, Tone. "A Digital Tool to Improve the Efficiency of IT Forensic Investigations." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40232.
Full textPatterson, Farrah M. "The implications of virtual environments in digital forensic investigations." Master's thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4819.
Full textID: 030646240; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (M.S.)--University of Central Florida, 2011.; Includes bibliographical references (p. 46).
M.S.
Masters
Computer Science
Engineering and Computer Science
Digital Forensics; Science/Computing Track
Liljekvist, Erika, and Oscar Hedlund. "Uncovering Signal : Simplifying Forensic Investigations of the Signal Application." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44835.
Full textHargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.
Full textHargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.
Full textRoussel, Bruno. "Les investigations numériques en procédure pénale." Thesis, Bordeaux, 2020. http://www.theses.fr/2020BORD0075.
Full textDigitalization has more effects on our society. So, the criminal inquiry must be adapted in order to include digital investigations. Those investigations allow accessing, gathering and creating data. In the current state of criminal proceedings in France, the digital information manipulated during investigative acts is separated, which undermines the efficiency of their exploitation as well as the protection of data subjects ' rights. This study proposes an approach that allows the analysis of all the digital information collected during a procedure, grouped, for better exploitation. Moreover, a lot of legal processing of personal data exist in France. Data recorded in those files are divided, and the same data is stored in many judicial files. Our work studies the possibility to aggregate some of the identical data, like identification or address in order to improve criminal proceedings
Montasari, Reza. "The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice." Thesis, University of Derby, 2016. http://hdl.handle.net/10545/620799.
Full textSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Full textEtow, Tambue Ramine. "IMPACT OF ANTI-FORENSICS TECHNIQUES ON DIGITAL FORENSICS INVESTIGATION." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97116.
Full textAlqahtany, Saad. "A forensically-enabled IaaS cloud computing architecture." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9508.
Full textSonnekus, Michael Hendrik. "A comparison of open source and proprietary digital forensic software." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.
Full textVan, Ramesdonk Paul. "Continued forensic development - investigation into current trends and proposed model for digital forensic practitioners." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/20707.
Full textRule, Samantha Elizabeth. "A Framework for using Open Source intelligence as a Digital Forensic Investigative tool." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017937.
Full textWang, Mengmeng, and 王萌萌. "Temporal analysis on HFS+ and across file systems in digital forensic investigation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B50900122.
Full textpublished_or_final_version
Computer Science
Master
Master of Philosophy
Barbosa, Akio Nogueira. "Método para ranqueamento e triagem de computadores aplicado à perícia de informática." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-14062016-081553/.
Full textConsidering that one of the most common tasks for a legal expert acting in the information technology area is to look for invidences of interest in the content data storage devices (DADs). In most cases these evidences consist of keywords. During the time necessary to perform the DAD duplication, the expert is practically unable to interact with the data contained on DAD. In this work we have decided to verify the following hypothesis: It is possible, at the collection stage, to simultaneously hold the duplication of the DAD and scan to search for keywords in raw data, without thereby significantly impact the duplication time. The main objective of this thesis is to propose a method that allows to identify DADs with a strong chance of containing evidences of interest for a particular skill at the end of the collection stage, based on the keywords occurrences found by a scanner mechanism that operates at the raw data level. Based on these results, a triage of DADs is established. With the results of the triage, a ranking process is made, providing an indication of which DADs should be examined first at the analysis stage. The results of the ours experiments showed that it is possible and feasible to apply the method without hindering the duplication time and with a certain level of accuracy. In most cases, the application of the method contributes to reduce the number of DADs that must be analyzed, helping to reduces the human effort required.
Al, Mutawa Noora Ahmad Khurshid. "Integrating behavioural analysis within the digital forensics investigation process." Thesis, University of Central Lancashire, 2018. http://clok.uclan.ac.uk/25412/.
Full textLeRoi, Jack. "A forensic investigation of the electrical properties of digital audio recording." Thesis, University of Colorado at Denver, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1556863.
Full textIn media forensics, the devices; e.g. computers, smart phones, still/video cameras, audio recorders, and software; e.g. video, audio, and graphics editors, file and disk utilities, mathematical computation applications, are, for the most part, black boxes. The design specifications are usually proprietary and the operating specifications may be incomplete, inaccurate, or unavailable. This makes it difficult to validate the technology, but using it without validation could discredit a practitioner's findings or testimony. The alternative is to test the device or program to determine relevant characteristics of its performance.
An important and common device in media forensics is the portable digital audio recorder used to record surveillance and interviews. This type can also be used to record the alternating current (AC) waveform from the mains power. While small variations in the AC frequency (ENF) can be forensically important, distortion in the recording can affect its value in adjudication or investigation. A method is presented to evaluate aspects of a recorder's operation that can cause distortion. Specifically, the method measures the noise generated by the recorder's electronics in its input and amplifier circuits. The method includes a procedure to isolate the recorder from environmental sources of noise. The method analyzes the broadband noise floor produced by the range of recording conditions and recorder settings. It also analyzes the noise amplitude for the harmonics for the mains frequency.
Ademu, Inikpi. "A comprehensive digital forensics investigation model and guidelines for establishing admissible digital evidence." Thesis, University of East London, 2013. http://roar.uel.ac.uk/3992/.
Full textHomem, Irvin. "Towards Automation in Digital Investigations : Seeking Efficiency in Digital Forensics in Mobile and Cloud Environments." Licentiate thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-130742.
Full textAl-Morjan, Abdulrazaq Abdulaziz. "An investigation into a digital forensic model to distinguish between 'insider' and 'outsider'." Thesis, De Montfort University, 2010. http://hdl.handle.net/2086/4402.
Full textNikooazm, Elina. "Validation des logiciels d'expertise judiciaire de preuves informatiques." Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020021.
Full textIn criminal cases, judges confronted with questions of technical order in computer technology, designate expert witnesses who put their expertise at the service of justice. Duly appointed by the courts, they help the judge by providing evidence relevant to the investigation.They search the suspect’s seized digital devices for elements of computer related crime, while preserving the integrity of the data and avoiding any alteration of the original media.The evidence thus collected is analyzed by a digital forensic expert who will document their findings to the judge in a report.Technical investigations are conducted by using powerful and sophisticated tools to find the current files and recover deleted, hidden or encrypted data from the digital media device examined.This requires perfect control of the utilized equipment and a clear identification of the methods used during the analysis. This research project aims to highlight the technical challenges which experts face, the complexity of digital forensic tools used for technical investigations, and the importance of their validation to understand the capabilities and limitations of each tool
Mankantshu, Mninawe Albert. "Investigating the factors that influence digital forensic readiness in a South African organisation." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8504.
Full textComputer crimes affect the bottom line of organisations across the globe. The ability of criminals to exploit organisational systems and avoid prosecution is a concern for most organisations. This is due to the increased use of information and communication technology (ICT) by individuals and organisations. The rapid growth of ICT has affected our communication and information exchange. These advances have not only influenced the way we conduct our daily activities, but has also led to new opportunities, risks and challenges for technical and legal structures. Unfortunately, some individuals and groups have decided to use these ICT advances in order to engage in criminal activities, such as cybercrime. The increase of cyber-related crimes puts a lot of pressure on law enforcement agencies and organisations across the globe to produce credible digital forensic evidence.
AlMarri, Saeed. "A structured approach to malware detection and analysis in digital forensics investigation." Thesis, University of Bedfordshire, 2017. http://hdl.handle.net/10547/622529.
Full textHewling, Moniphia Orlease. "Digital forensics : an integrated approach for the investigation of cyber/computer related crimes." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/326231.
Full textWaltereit, Marian [Verfasser], and Torben [Akademischer Betreuer] Weis. "On the Digital Forensic Investigation of Hit-And-Run Accidents / Marian Waltereit ; Betreuer: Torben Weis." Duisburg, 2021. http://d-nb.info/1236539818/34.
Full textNordin, Anton, and Felix Liffner. "Forensiska Artefakter hos Mobila Applikationer : Utvinning och Analys av Applikationen Snapchat." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40207.
Full textFederici, Corrado <1965>. "The twofold role of Cloud Computing in Digital Forensics: target of investigations and helping hand to evidence analysis." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amsdottorato.unibo.it/6694/.
Full textJones, Eric Douglas. "Forensic Investigation of Stamped Markings Using a Large-Chamber Scanning Electron Microscope and Computer Analysis for Depth Determination." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1237.
Full textHomem, Irvin. "LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902.
Full textBreitinger, Frank [Verfasser], Stefan [Akademischer Betreuer] Katzenbeisser, Harald [Akademischer Betreuer] Baier, and Felix [Akademischer Betreuer] Freiling. "On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations / Frank Breitinger. Betreuer: Stefan Katzenbeisser ; Harald Baier ; Felix Freiling." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2014. http://d-nb.info/1110901852/34.
Full textBouchaud, François. "Analyse forensique des écosystèmes intelligents communicants de l'internet des objets." Thesis, Lille, 2021. http://www.theses.fr/2021LILUI014.
Full textWith the development of the Internet of Things, searching for data in a digital environment is an increasingly difficult task for the forensic investigator. It is a real challenge, especially given the heterogeneity of the connected objects. There is a lack of standardization in communication architectures and data management policies. It is accompanied by dependencies between connected ecosystems, especially through hidden links and fragmented information. In this thesis, we suggest adjusting the traditional approach of digital investigation to the constraints of the Internet of Things. We develop methodologies and tools to understand and analyze the connected environment. We assume that the crime scene is a connected whole and not an aggregate of independent digital objects. It contains key data for understanding and contextualizing a past event or phenomenon as evidence for the criminal trial. Digital forensics is considered to be the og extit{application of science to the identification, collection, examination, and analysis, of data while preserving the integrity of the information and maintaining a strict chain of custody for the data fg~ (National Institute of Standards and Technology). Faced with a crime scene, the investigator seeks to understand the criminal event. He examines the data stored in the physical medium and/or in a remote part of the cloud. Our work develops a process of rapid identification of the phenomenon according to four phases: detection, localization, object recognition and information crosschecking. It is enriched with radio signature search tools~: single-sensor and multi-sensor mesh network. This approach is built around the problem of apprehending a multiform connected environment, containing devices that are not always visible or identifiable during a field approach. We integrate in our study the strategy of equipment collection. The challenge lies in the ability to extract one or more connected objects, without compromising the stored data, to place them in a controlled and secure environment. The object is maintained in a state that guarantees the non-alteration or loss of data. The study includes a first phase of understanding the physical environment and dependencies. It seeks to determine the mechanisms of information migration to online platforms and to isolate groups of objects by intelligently breaking the connections. Devices are extracted, then packaged and sealed according to their technical characteristics and the connected infrastructure. We then deepen the exploitation of the information collected using forensic methods. The data is then analyzed according to temporal, spatial and contextual axes. We also propose a classification and a prioritization of the connected structure according to the characteristics of the desired data. The work gives a reading of the life cycle of the data within the Internet of Things infrastructure. In a prospective approach, we deepen the questions of the fine identification of the connected object according to these hardware and software characteristics. The acoustic signature of electronics appears as a relevant physical property in the study of equipment. This feature completes our range of tools in the identification of connected objects
Lalanne, Vincent. "Gestion des risques appliquée aux systèmes d’information distribués." Thesis, Pau, 2013. http://www.theses.fr/2013PAUU3052/document.
Full textIn this thesis we discuss the application of risk management to distributed information systems. We handle problems of interoperability and securisation of the exchanges within DRM systems and we propose the implementation of this system for the company: it needs to permit the distribution of self-protected contents. We then present the (our) participation in the creation of an innovative company which emphasizes on the security of information, in particular the management of risks through the ISO/IEC 27005:2011 standard. We present risks related to the use of services, highlighting in particular the ones which are not technological: we approach inheritent risks in clouds (provider failure, etc ...) but also the more insidious aspects of espionage and intrusion in personal data (Case PRISM in June 2013). In the last section, we present a concept of a DRM company which uses metadata to deploy settings in usage control models. We propose a draft formalization of metadata necessary for the implementation of a security policy and guarantee respect of regulations and legislation
Arthur, Kweku Kwakye. "Considerations towards the development of a forensic evidence management system." Diss., 2010. http://hdl.handle.net/2263/26567.
Full textDissertation (MSc)--University of Pretoria, 2010.
Computer Science
unrestricted
Alharbi, Soltan Abed. "Proactive System for Digital Forensic Investigation." Thesis, 2014. http://hdl.handle.net/1828/5237.
Full textGraduate
0984
0537
soltanalharbi@hotmail.com
Grobler, Cornelia Petronella. "DFMF : a digital forensic management framework." Thesis, 2012. http://hdl.handle.net/10210/6365.
Full textWe are living in an increasingly complex world in which much of society is dependent on technology and its various offshoots and incarnations (Rogers & Siegfried, 2004). There is ample evidence of the influence of technology on our daily lives. We communicate via e-mail, use chat groups to interact and conduct business by using e-commerce. People relate each other’s existence to a presence on Facebook. The convergence of the products, systems and services of information technology is changing the way of living. The latest smart and cell phones have cameras, applications, and access to social networking sites. These phones contain sensitive information, for example photographs, e-mail, spread sheets, documents, and presentations. The loss of a cell phone therefore may pose a serious problem to an individual or an organisation, when considering privacy and intellectual property issues from an information security (Info Sec) perspective (Pieterse, 2006). Organisations have accepted the protection of information and information assets as a fundamental business requirement and managers are therefore implementing an increasing number of security counter measures, such as security policies, intrusion detection systems, access control mechanisms, and anti-virus products to protect the information and information assets from potential threats. However, incidents still occur, as no system is 100% secure. The incidents must be investigated to determine their root cause and potentially to prosecute the perpetrators (Louwrens, von Solms, Reeckie & Grobler, 2006b). Humankind has long been interested in the connection between cause and event, wishing to know what happened, what went wrong and why it happened. The need for computer forensics emerged when an increasing number of crimes were committed with the use of computers and the evidence required was stored on the computer. In 1984, a Federal Bureau of Investigation (FBI) laboratory began to examine computer evidence (Barayumureeba & Tushabe, 2004), and in 1991 the international association of computer investigation specialists (IACIS) in Portland, Oregon coined the term ‘computer forensics’ during a training session.
Adedayo, Oluwasola Mary. "Reconstruction in Database Forensics." Thesis, 2015. http://hdl.handle.net/2263/43777.
Full textThesis (PhD)--University of Pretoria, 2015.
Computer Science
PhD
Unrestricted
Fei, B. K. L. (Bennie Kar Leung). "Data visualisation in digital forensics." Diss., 2007. http://hdl.handle.net/2263/22996.
Full textDissertation (MSc (Computer Science))--University of Pretoria, 2007.
Computer Science
unrestricted
Delgado, Manuel. "Combater o crime económico com armas digitais: o papel do open-source." Master's thesis, 2012. http://hdl.handle.net/10071/8063.
Full textIn addition to the extraordinary economic development provided by the evolution of Information and Communication Technologies, boosted in recent years, with the development of internet, will be consolidating an anarchic and obscure dimension that, under cover of anonymity and exploiting the same technology, conveys a myriad of behaviors of a criminal nature, which tend to undermine the basic principles of living in society, some of which have contributed greatly to the dimensions of this economic crisis. Many of the difficulties that the generality of the justice systems faced to master this new type of crime, rooted in the Technological Gap between the means used by organized crime and those that have the justice system. Taking as reference the phenomenon of economic crime, this dissertation presents the Forensic Computing as a tool essential to combat that scourge. Through the literature review, I will seek to show, specific scenarios, but recurrent in the investigation of economic crime, in order to realize at a later stage, their treatment with the use of Open Source tools, comparing the results obtained with the same treatment carried out based on a commercial reference tool. Thus I will show that tools are available that enable a qualitative jump in research processes, without jeopardizing the budget balance of the justice departments, as the current economic situation requires.
Valjarevic, Aleksandar. "A comprehensive and harmonised digital forensic investigation process model." Thesis, 2015. http://hdl.handle.net/2263/50812.
Full textThesis (PhD)--University of Pretoria, 2015.
tm2015
Computer Science
PhD
Unrestricted
Pooe, El Antonio. "Developing a multidisciplinary digital forensic readiness model for evidentiary data handling." Thesis, 2018. http://hdl.handle.net/10500/25316.
Full textInformation Science
Ph.D. (Information Systems)
張緹柔. "A Study on Investigation and Digital Forensic for Wireless Cyber Crime." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/k5896p.
Full textNdara, Vuyani. "Computer seizure as technique in forensic investigation." Diss., 2014. http://hdl.handle.net/10500/13277.
Full textDepartment of Criminology
M.Tech. (Forensic Investigation)
Bernardo, Bruno Miguel Vital. "Toolbox application to support and enhance the mobile device forensics investigation process - breaking through the techniques available." Master's thesis, 2021. http://hdl.handle.net/10362/113177.
Full textOne of the main topics that is discussed today is how can a person leverage on technology on a positive and secure way in order to enhance their daily life, making it a healthier, more productive, joyful and easier. However, with improvements in technology, comes challenges for which there is not yet a stable and safe way to overcome. One of the greatest challenges that people are faced has to do with their concern on their privacy and on the safeguard of their sensitive information that is stored in any device that one uses. In fact, one of the most used technology is the Mobile, which can take several forms, features, shapes, and many other components. In line manner, cybercrime is growing rapidly, targeting the exploitation and retrieval of information from these gadgets. Even so, with a Mobile, comes several challenges including a rapidly dynamic change in its landscape, an everincreasing diversity of mobile phones forms, integration of the information on a Mobile into the Cloud and IoT. As such, it’s vital to have a stable and safe toolbox that will enable a digital investigator to potentially prevent, detect and solve any issue that may be related to Mobile Device Forensics while solving out various investigations, being it criminal, civil, corporate or any other.
Joshi, Abhishek Shriram. "Image Processing and Super Resolution Methods for a Linear 3D Range Image Scanning Device for Forensic Imaging." 2013. http://hdl.handle.net/1805/3414.
Full textIn the last few decades, forensic science has played a significant role in bringing criminals to justice. Shoe and tire track impressions found at the crime scene are important pieces of evidence since the marks and cracks on them can be uniquely tied to a person or vehicle respectively. We have designed a device that can generate a highly accurate 3-Dimensional (3D) map of an impression without disturbing the evidence. The device uses lasers to detect the changes in depth and hence it is crucial to accurately detect the position of the laser. Typically, the forensic applications require very high resolution images in order to be useful in prosecutions of criminals. Limitations of the hardware technology have led to the use of signal and image processing methods to achieve high resolution images. Super Resolution is the process of generating higher resolution images from multiple low resolution images using knowledge about the motion and the properties of the imaging geometry. This thesis presents methods for developing some of the image processing components of the 3D impression scanning device. In particular, the thesis describes the following two components: (i) methods to detect the laser stripes projected onto the impression surface in order to calculate the deformations of the laser stripes due to 3D surface shape being scanned, and (ii) methods to improve the resolution of the digitized color image of the impression by utilizing multiple overlapping low resolution images captured during the scanning process and super resolution techniques.
Breitinger, Frank. "On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations." Phd thesis, 2014. https://tuprints.ulb.tu-darmstadt.de/4055/1/20140717_Dissertation_Breitinger_final.pdf.
Full textLochner, Hendrik Thomas. "Kartering van selfoontegnologie." Diss., 2007. http://hdl.handle.net/10500/554.
Full textCriminology
M.Tech. (Forensic Investigation)