Academic literature on the topic 'Digital forensic process'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital forensic process.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital forensic process"

1

Boateng, Bismark. "Mobile Device’s Digital Forensic Process Model." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 267–72. http://dx.doi.org/10.22624/aims/crp-bk3-p43.

Full text
Abstract:
The primary goal is to compare various digital forensics process models, particularly mobile devices. One must conduct investigations forensically to prosecute digital offenders, with the resulting evidence acknowledged in a court of law. Digital forensic process models outline the necessary procedures that one must follow to ensure a successful enquiry. Keywords: Mobile Devices, Digital Devices, Digital Evidence and Smartphone BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free
APA, Harvard, Vancouver, ISO, and other styles
2

Dr., J. Saravanesh. "RETROSPECTIVE VIEW OF DIGITAL FORENSIC PROCESS EMPHASISING COMPUTER FORENSICS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 5 (2019): 509–15. https://doi.org/10.5281/zenodo.3234978.

Full text
Abstract:
Forensics is a constantly improvising field which can be said as an application of science to the legal process. Digital forensics is a division of forensic science detailing the recovery and investigation of material found in digital devices, frequently in relation to computer based crimes. The term digital forensics was initially used as a synonym for computer forensics and has extended to wrap investigation of all devices capable of storing digital data. Branches of forensic science are embedded in every branch of science and many other aspects of Digital era because of its capability to un
APA, Harvard, Vancouver, ISO, and other styles
3

Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.

Full text
Abstract:
This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices. The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns to be recognized i.e.,
APA, Harvard, Vancouver, ISO, and other styles
4

Al Jum'ah, Muhammad Na'im, Hamid Wijaya, and Rima Ruktiari Ismail. "Implementasi Model Digital Forensik Procces Untuk Sosial Media Investigation Dengan Tools Hunchly." Cyber Security dan Forensik Digital 6, no. 2 (2024): 48–53. http://dx.doi.org/10.14421/csecurity.2023.6.2.4265.

Full text
Abstract:
Perkembangan teknologi yang semakin pesat dapat menjadi dampak posistif dan dapat negatif. Dampak positifnya adalah proses penyebaran informasi yang semakin cepat, namun dampak negatifnya adalah banyaknya informasi hoax dan hate space yang terjadi di media sosial akibat tidak adanya filter dan pengecekan keabsahan informasi. Hal ini juga mengakibatkan banyaknya tindak kejahatan yang terjadi di media sosial. Salah satu pemecahan masalah dengan banyaknya kasus yang terjadi akibat penyalahgunaan media sosial adalah dengan melakukan proses invesitgasi forensic pada social media. Proses investigasi
APA, Harvard, Vancouver, ISO, and other styles
5

Rochmadi, Tri, Abdul Fadlil, and Imam Riadi. "Tinjauan Pustaka Sistematis: Tantangan Dan Faktor-Faktor Pengembangan Kesiapan Forensik Digital." Cyber Security dan Forensik Digital 7, no. 2 (2024): 81–89. https://doi.org/10.14421/csecurity.2024.7.2.4861.

Full text
Abstract:
Teknologi informasi telah mengubah hampir segala lini kehidupan dari konvensional ke digitalisasi. Digitalisasi yang begitu cepat, menimbulkan permasalahan pada serangan siber yang belum diimbangi oleh penanganan insiden siber. Kesiapan forensik digital menjadi hal penting bagi organisasi agar proses penanganan insiden lebih efektif dan efisien. Tujuan penelitian ini adalah mengidentifikasi faktor-faktor dan tantangan terkait topik kesiapan digital forensik. Metode yang digunakan dalam penelitian ini menggunakan metode tinjauan pustaka sistematis. Hasil yang didapatkan pada penelitian ini memb
APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.

Full text
Abstract:
Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic
APA, Harvard, Vancouver, ISO, and other styles
7

Hakim, Muhamad Faishol, and Alamsyah Alamsyah. "Development of Digital Forensic Framework for Anti-Forensic and Profiling Using Open Source Intelligence in Cyber Crime Investigation." Recursive Journal of Informatics 2, no. 2 (2024): 114–23. http://dx.doi.org/10.15294/rji.v2i2.73731.

Full text
Abstract:
Abstract. Cybercrime is a crime that increases every year. The development of cyber crime occurs by utilizing mobile devices such as smartphones. So it is necessary to have a scientific discipline that studies and handles cybercrime activities. Digital forensics is one of the disciplines that can be utilized in dealing with cyber crimes. One branch of digital forensic science is mobile forensics which studies forensic processes on mobile devices. However, in its development, cybercriminals also apply various techniques used to thwart the forensic investigation process. The technique used is ca
APA, Harvard, Vancouver, ISO, and other styles
8

Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.

Full text
Abstract:
Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirement
APA, Harvard, Vancouver, ISO, and other styles
9

Venter, Hein, and Ivan Burke. "The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks." JUCS - Journal of Universal Computer Science 18, no. (12) (2012): 1721–40. https://doi.org/10.3217/jucs-018-12-1721.

Full text
Abstract:
Over the past decade, wireless mobile communication technology based on the IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cybercrime. WLAN digital forensics is seen as not only a response to cybercrime in wireless networks, but also a means to stem the increase of cybercrime in WLANs. The challenge in WLAN digital forensics is to intercept and preserve all the communications generated by the mobile stations and to conduct a proper digital forensic investigation. This
APA, Harvard, Vancouver, ISO, and other styles
10

Holdberh, Natalia, and Viktoriya Kolonska. "DIGITAL FORENSICS IN MARTIAL LAW." Scientific works of National Aviation University Series Law Journal "Air and Space Law" 4, no. 73 (2024): 213–18. https://doi.org/10.18372/2307-9061.73.19470.

Full text
Abstract:
The purpose of the article is to study a new area of forensics - digital forensics. Research methods: the article uses the hermeneutic method, the method of classification, logical methods (analysis, synthesis, induction, deduction, generalization, etc.), and the method of systematization. Results: the article explores a new branch of forensics, namely digital forensics. Digital forensics is becoming increasingly important and is becoming one of the main components of traditional forensics. Knowledge of digital forensics is used in many investigative actions and in the process of appointing re
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Digital forensic process"

1

Kohn, Michael Donovan. "Integrated digital forensic process model." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/25433.

Full text
Abstract:
The Information and Communications Technology (ICT) environment constitutes an integral part of our daily lives. Individual computer users and large corporate companies are increasingly dependent on services provided by ICT. These services range from basic communication to managing large databases with corporate client information. Within these ICT environments something is bound to go wrong for a number of reasons, which include an intentional attack on information services provided by an organisation. These organisations have in turn become interested in tracing the root cause of such an inc
APA, Harvard, Vancouver, ISO, and other styles
2

Montasari, Reza. "The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice." Thesis, University of Derby, 2016. http://hdl.handle.net/10545/620799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Delport, Waldo. "Forensic evidence isolation in clouds." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/33490.

Full text
Abstract:
Cloud computing is gaining acceptance and also increasing in popularity. Organisations often rely on cloud resources as an effective replacement for their `in-house' computer systems. In the cloud, virtual resources are provided from a larger pool of resources, these resources being available to multiple different clients. When something suspicious happens within a digital environment, a digital forensic investigation may be conducted to gather information about the event. When conducting such an investigation digital forensic procedures are followed. These procedures involve the ste
APA, Harvard, Vancouver, ISO, and other styles
4

Adams, Richard. "The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice." Thesis, Adams, Richard (2012) The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice. PhD thesis, Murdoch University, 2012. https://researchrepository.murdoch.edu.au/id/eprint/14422/.

Full text
Abstract:
Given the pervasive nature of information technology, the nature of evidence presented in court is now less likely to be paper-based and in most instances will be in electronic form . However, evidence relating to computer crime is significantly different from that associated with the more ‘traditional’ crimes for which, in contrast to digital forensics, there are well-established standards, procedures and models to which law courts can refer. The key problem is that, unlike some other areas of forensic practice, digital forensic practitioners work in a number of different environments and
APA, Harvard, Vancouver, ISO, and other styles
5

Alfaize, Najah Abdulaziz. "The impact of culture and religion on digital forensics : the study of the role of digital evidence in the legal process in Saudi Arabia." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/13124.

Full text
Abstract:
This work contributes to the multi-disciplinary community of researchers in computer science, information technology and computer forensics working together with legal enforcement professionals involved in digital forensic investigations. It is focused on the relationship between scientific approaches underpinning digital forensics and the Islamic law underpinning legal enforcement. Saudi Arabia (KSA) is studied as an example of an Islamic country that has adopted international guidelines, such as ACPO, in its legal enforcement procedures. The relationship between Islamic law and scientific AC
APA, Harvard, Vancouver, ISO, and other styles
6

Lu, Andy. "Forensic analysis on wireless medical devices." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2541.

Full text
Abstract:
The number of Internet of Things (IoT) devices is forecast to grow to over 25 billion by 2030, with the healthcare IoT market projected to grow to 25.9% of IoT devices by 2028 worldwide. However, with new and growing technologies come new types of risks. Current risk assessment and risk management methods haven’t been designed to anticipate or predict these risks. IoT risks relate to openness and lack of standardisation, linking and connectivity between the devices and the lack of skilled support for IoT devices and networks. These factors put medical IoT devices and, by extension, their users
APA, Harvard, Vancouver, ISO, and other styles
7

Pollitt, Mark. "The Hermeneutics of the Hard Drive: Using Narratology, Natural Language Processing, and Knowledge Management to Improve the Effectiveness of the Digital Forensic Process." Doctoral diss., University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/6004.

Full text
Abstract:
In order to protect the safety of our citizens and to ensure a civil society, we ask our law enforcement, judiciary and intelligence agencies, under the rule of law, to seek probative information which can be acted upon for the common good. This information may be used in court to prosecute criminals or it can be used to conduct offensive or defensive operations to protect our national security. As the citizens of the world store more and more information in digital form, and as they live an ever-greater portion of their lives online, law enforcement, the judiciary and the Intelligence Communi
APA, Harvard, Vancouver, ISO, and other styles
8

Martinka, Jan. "Digitální forenzní věda a její aplikace při forenzním auditu účetnictví." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-193055.

Full text
Abstract:
This thesis aims to describe a process framework suitable for conducting digital forensics investigation projects as support for forensic audit. Selection of existing digital forensics investigation framework was a subject of criterial comparison. Described new framework is a result of combination and enhancement of those frameworks, which were suitable for the characteristics of forensic audit. Thesis also discusses digital forensics methods for fraud examination and risk assessment as a part of external audit.
APA, Harvard, Vancouver, ISO, and other styles
9

Al, Mutawa Noora Ahmad Khurshid. "Integrating behavioural analysis within the digital forensics investigation process." Thesis, University of Central Lancashire, 2018. http://clok.uclan.ac.uk/25412/.

Full text
Abstract:
This programme of research focused on incorporating Behavioural Analysis (BA) within the digital forensics investigation process. A review of previously developed digital forensics investigation models indicated a lack of sufficient consideration of the behavioural and motivational dimensions of offending, and the way in which digital evidence can be used to address these issues during the investigation process. This programme of research aimed to build on previous work by scientific researchers and investigators by developing a digital forensics investigation model which incorporates greater
APA, Harvard, Vancouver, ISO, and other styles
10

Saleem, Shahzad. "Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics." Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-116581.

Full text
Abstract:
Scientific development and progress in the fields of computer science, information technology and their related disciplines, have transformed our world into a “digital world”. Omnipresent digital devices and e-services running on numerous versions of pervasive e-infrastructures generate a wealth of electronically stored information (ESI) from which we can extract a great deal of potential digital evidence. Digital evidence is sometimes even more revealing than its traditional counterpart, but at the same time it is very fragile and volatile in nature. Preserving the integrity of digital eviden
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Digital forensic process"

1

Timchenko, Vladimir. Theory and practice of forensic economic expertise: problems and prospects. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2048106.

Full text
Abstract:
The monograph examines the problematic aspects of the theory and practice of forensic economic expertise in modern conditions. The problems of forming new methods of expert research of objects submitted for examination in digital form are raised. The possibilities of using artificial intelligence systems to solve the problems of forensic economic expertise are being investigated. Specific proposals have been developed to improve the legal regulation of forensic activities. For graduate students of higher educational institutions enrolled in postgraduate programs in the group of scientific spec
APA, Harvard, Vancouver, ISO, and other styles
2

Johnson, Chad R. Digital Investigations: The Forensic Process and Examination of Digital Evidence. Elsevier Science & Technology Books, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johnson, Chad R. Digital Investigations: The Forensic Process and Examination of Digital Evidence. Elsevier Science & Technology, 2029.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sachowski, Jason. Implementing Digital Forensic Readiness: From Reactive to Proactive Process. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sachowski, Jason. Implementing Digital Forensic Readiness: From Reactive to Proactive Process. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Heathcote, Luke. Digital Forensic Process Model for Mobile Business Devices: Smart Technologies. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sachowski, Jason. Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sachowski, Jason. Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sachowski, Jason. Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Digital forensic process"

1

Accorsi, Rafael, and Claus Wonnemann. "Forensic Leak Detection for Business Process Models." In Advances in Digital Forensics VII. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24212-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vermaas, Oscar, Joep Simons, and Rob Meijer. "Open Computer Forensic Architecture a Way to Process Terabytes of Forensic Disk Images." In Open Source Software for Digital Forensics. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-5803-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Le-Khac, Nhien-An, James Plunkett, M.-Tahar Kechadi, and Lei Chen. "Digital Forensic Process and Model in the Cloud." In Security, Privacy, and Digital Forensics in the Cloud. John Wiley & Sons Singapore Pte. Ltd, 2019. http://dx.doi.org/10.1002/9781119053385.ch12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yadav, Seema, Khaleel Ahmad, and Jayant Shekhar. "Analysis of Digital Forensic Tools and Investigation Process." In High Performance Architecture and Grid Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Montasari, Reza, Richard Hill, Victoria Carpenter, and Amin Hosseinian-Far. "The Standardised Digital Forensic Investigation Process Model (SDFIPM)." In Blockchain and Clinical Trial. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11289-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baror, Stacey O., Hein S. Venter, and Richard Adeyemi Ikuesan. "A Digital Forensic Readiness Cybercrime Semantic Trigger Process." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06374-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Valjarevic, Aleksandar, and Hein Venter. "A Harmonized Process Model for Digital Forensic Investigation Readiness." In Advances in Digital Forensics IX. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41148-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barik, Kousik, A. Abirami, Karabi Konar, and Saptarshi Das. "Research Perspective on Digital Forensic Tools and Investigation Process." In Illumination of Artificial Intelligence in Cybersecurity and Forensics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93453-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Montasari, Reza. "Testing the Comprehensive Digital Forensic Investigation Process Model (the CDFIPM)." In Technology for Smart Futures. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60137-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rajendran, S., and N. P. Gopalan. "Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD)." In Proceedings of the International Conference on Soft Computing Systems. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2674-1_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital forensic process"

1

Matharasi, Thrushna, and Priyam Ganguly. "Solving the Financial, Operational, and Reputational Impact of Commercial Fleet Collisions: Challenges and Mitigation Strategies Using Data-Driven Decision-Making Process." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mumba, Emilio Raymond, and H. S. Venter. "Mobile forensics using the harmonised digital forensic investigation process." In 2014 Information Security for South Africa (ISSA). IEEE, 2014. http://dx.doi.org/10.1109/issa.2014.6950491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Valjarevic, Aleksandar, and Hein S. Venter. "Harmonised digital forensic investigation process model." In 2012 Information Security for South Africa (ISSA). IEEE, 2012. http://dx.doi.org/10.1109/issa.2012.6320441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Selamat, Siti Rahayu, Robiah Yusof, Shahrin Sahib, Nor Hafeizah Hassan, Mohd Faizal Abdollah, and Zaheera Zainal Abidin. "Traceability in digital forensic investigation process." In 2011 IEEE Conference on Open Systems (ICOS). IEEE, 2011. http://dx.doi.org/10.1109/icos.2011.6079259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cosic, Jasmin, Christian Schlehuber, and Drazen Morog. "Digital Forensic Investigation Process in Railway Environment." In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2021. http://dx.doi.org/10.1109/ntms49979.2021.9432658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Botas, Alvaro, Ricardo J. Rodriguez, Teemu Vaisanen, and Patrycjusz Zdzichowski. "Counterfeiting and Defending the Digital Forensic Process." In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). IEEE, 2015. http://dx.doi.org/10.1109/cit/iucc/dasc/picom.2015.291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sibiya, George, H. S. Venter, Sipho Ngobeni, and Thomas Fogwill. "Guidelines for procedures of a harmonised digital forensic process in network forensics." In 2012 Information Security for South Africa (ISSA). IEEE, 2012. http://dx.doi.org/10.1109/issa.2012.6320451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saigopal, Venkata Venugopal Rao Gudlur, and Dr Valliappan Raju. "IoT based Secure Digital Forensic Process according to Process Management." In 2020 International Conference on Computational Intelligence (ICCI). IEEE, 2020. http://dx.doi.org/10.1109/icci51257.2020.9247710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

De, Sanghamitra, Mridul Sankar Barik, and Indrajit Banerjee. "A Digital Forensic Process Model for Cloud Computing." In 2020 IEEE Calcutta Conference (CALCON). IEEE, 2020. http://dx.doi.org/10.1109/calcon49167.2020.9106500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaya, Mehmet, Shannon Conley, Zhala S. Othman, and Asaf Varol. "Effective software refactoring process." In 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, 2018. http://dx.doi.org/10.1109/isdfs.2018.8355350.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Digital forensic process"

1

Guzmán Paredes, Yomaira, and Francy Yaneth Patiño Martínez. WhatsApp como evidencia probatoria en Colombia. Ediciones Universidad Cooperativa de Colombia, 2024. https://doi.org/10.16925/gclc.58.

Full text
Abstract:
A través de esta lectura crítica, las autoras mostrarán cómo la evidencia digital de los mensajes de WhatsApp y distintos medios digitales como redes sociales pueden ser soporte de evidencia digital en un proceso de auditoría. La auditoría ha evolucionado con el auge y desarrollo de los computadores y sistemas de información, dando apertura a la auditoría de sistemas, la cual requiere de expertos en informática forense, auditoría y peritos forenses. Las Cortes judiciales en Colombia han aceptado que las evidencias digitales (WhatsApp) sean tenidas en cuentas como material probatorio en proceso
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!