To see the other types of publications on this topic, follow the link: Digital forensics.

Dissertations / Theses on the topic 'Digital forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Digital forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Singh, Avinash. "A Digital Forensic Readiness Approach for Ransomware Forensics." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/75610.

Full text
Abstract:
Computers play a vital role in the automation of tedious tasks in our everyday lives. With the adoption of the advances in technology, there is a significant increase in the exploitation of security vulnerabilities, particularly in Windows computing environments. These exploitations are mostly carried out by malicious software (malware). Ransomware, a variant of malware which encrypts user files and retains the decryption key for ransom. Ransomware has shown its dominance over the years wreaking havoc to many organizations and users. This global digital epidemic is continuously on the r
APA, Harvard, Vancouver, ISO, and other styles
2

Almarzooqi, Ahmed. "Digital forensics practices : a road map for building digital forensics capability." Thesis, De Montfort University, 2016. http://hdl.handle.net/2086/14178.

Full text
Abstract:
Identifying the needs for building and managing Digital Forensics Capability (DFC) are important because these can help organisations to stay abreast of criminal’s activities and challenging pace of technological advancement. The field of Digital Forensics (DF) is witnessing rapid development in investigation procedures, tools used, and the types of digital evidence. However, several research publications confirm that a unified standard for building and managing DF capability does not exit. Therefore, this thesis identifies, documents, and analyses existing DF frameworks and the attitudes of o
APA, Harvard, Vancouver, ISO, and other styles
3

Mandelecha, Sonal. "Prototype Digital Forensics Repository." ScholarWorks@UNO, 2005. http://scholarworks.uno.edu/td/292.

Full text
Abstract:
The explosive growth in technology has led to a new league of a crime involving identity theft, stealing trade secrets, malicious virus attacks, hacking of DVD players, etc. The law enforcement community which has been trained to deal with traditional form of crime, is now being trained in a new realm of Digital Forensics. Forensics investigators have realized that often the most valuable resource available to them is experience and knowledge of fellow investigators. But there is seldom an explicit mechanism for disseminating this knowledge. Hence the same problems and mistakes contin
APA, Harvard, Vancouver, ISO, and other styles
4

Marziale, Lodovico. "Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.

Full text
Abstract:
Digital forensics is the science concerned with discovering, preserving, and analyzing evidence on digital devices. The intent is to be able to determine what events have taken place, when they occurred, who performed them, and how they were performed. In order for an investigation to be effective, it must exhibit several characteristics. The results produced must be reliable, or else the theory of events based on the results will be flawed. The investigation must be comprehensive, meaning that it must analyze all targets which may contain evidence of forensic interest. Since any investi
APA, Harvard, Vancouver, ISO, and other styles
5

Etow, Tambue Ramine. "IMPACT OF ANTI-FORENSICS TECHNIQUES ON DIGITAL FORENSICS INVESTIGATION." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97116.

Full text
Abstract:
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly because forensic investigations are based on artifacts left oncomputers and other digital devices. In recent times, perpetrators of computer crimesare getting abreast of the digital forensics dynamics hence, capacitated to use someanti-forensics measures and techniques to obfuscate the investigation processes.Incases where such techniques are employed, it becomes extremely difficult, expensive and time consuming to carry out an effective investigation. This might causea digital forensics expert t
APA, Harvard, Vancouver, ISO, and other styles
6

Howard, Sean David. "Customization and automation in the future of digital forensics live OS forensics with FENIX (forensic examiner unix) /." [Ames, Iowa : Iowa State University], 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Flory, Christopher M. "Digital forensics and community supervision| Making a case for field based digital forensics training." Thesis, Purdue University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1597627.

Full text
Abstract:
<p>In this paper I will review the literature concerning investigator digital forensics models and how they apply to field investigators. A brief history of community supervision and how offenders are supervised will be established. I will also cover the difference between community supervision standards and police standards concerning searches, evidence, standards of proof, and the difference between parole boards and courts. Currently, the burden for digital forensics for community supervision officers is placed on local or state law enforcement offices, with personnel trained in forensics,
APA, Harvard, Vancouver, ISO, and other styles
8

Fei, Bennie Kar Leung. "Data visualisation in digital forensics." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-03072007-153241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Altiero, Roberto A. "Digital Forensics Tool Interface Visualization." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/24.

Full text
Abstract:
Recent trends show digital devices utilized with increasing frequency in most crimes committed. Investigating crime involving these devices is labor-intensive for the practitioner applying digital forensics tools that present possible evidence with results displayed in tabular lists for manual review. This research investigates how enhanced digital forensics tool interface visualization techniques can be shown to improve the investigator's cognitive capacities to discover criminal evidence more efficiently. This paper presents visualization graphs and contrasts their properties with the output
APA, Harvard, Vancouver, ISO, and other styles
10

Bade, Hans, and Oscar Hedlund. "Anti-Forensik : Anti-forensiska metoder på mobila enheter." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701.

Full text
Abstract:
Mobiltelefoner har blivit grundläggande för extrahering av digitala artefakter i fo-rensiska utredningar. Androids Linuxbaserade operativsystem medför större möj-ligheter för anti-forensiska metoder, detta gör att kunskap om anti-forensik äressentiell för dagens IT-forensiska utredare. I denna studie belyses effekten avanti-forensik i Androidbaserade mobila enheter samt så upplyses det om dagensanti-forensiska attack metoder mot forensiska verktyg. Genom experiment så vi-sas det hur man kan förhindra ett forensisk verktyg från att extrahera data medanvändning av ett simpelt script.<br>Mobile p
APA, Harvard, Vancouver, ISO, and other styles
11

Montasari, Reza. "The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice." Thesis, University of Derby, 2016. http://hdl.handle.net/10545/620799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Qiao, Tong. "Statistical detection for digital image forensics." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0006/document.

Full text
Abstract:
Le XXIème siècle étant le siècle du passage au tout numérique, les médias digitaux jouent un rôle de plus en plus important. Les logiciels sophistiqués de retouche d’images se sont démocratisés et permettent de diffuser facilement des images falsifiées. Ceci pose un problème sociétal puisqu’il s’agit de savoir si ce que l’on voit a été manipulé. Cette thèse s'inscrit dans le cadre de la criminalistique des images. Trois problèmes sont abordés : l'identification de l'origine d'une image, la détection d'informations cachées dans une image et la détection d'un exemple falsification : le rééchanti
APA, Harvard, Vancouver, ISO, and other styles
13

Khan, Muhammad Naeem Ahmed. "Digital Forensics using Machine Learning Methods." Thesis, University of Sussex, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487975.

Full text
Abstract:
The increase in computer related crimes, with particular reference to internet crimes, has led to an increasing demand for state-of-the-art digital forensics. Reconstruction of the past events in chronological order is crucial for digital forensic investigations to pinpoint the execution of relevant application programs and the files manipulated by those applications. The event reconstruction process can be made more objective and rigorous by employing mathematical techniques due to their sound theoretical foundations. The focus of this research is to explore the effectiveness of employing mac
APA, Harvard, Vancouver, ISO, and other styles
14

Dontula, Varun. "Data Exploration Interface for Digital Forensics." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1373.

Full text
Abstract:
The fast capacity growth of cheap storage devices presents an ever-growing problem of scale for digital forensic investigations. One aspect of scale problem in the forensic process is the need for new approaches to visually presenting and analyzing large amounts of data. Current generation of tools universally employ three basic GUI components—trees, tables, and viewers—to present all relevant information. This approach is not scalable as increasing the size of the input data leads to a proportional increase in the amount of data presented to the analyst. We present an alternative approach, wh
APA, Harvard, Vancouver, ISO, and other styles
15

Calhau, João Pedro Figueira Galhardo. "Digital forensics research using constraint programming." Master's thesis, Universidade de Évora, 2018. http://hdl.handle.net/10174/24257.

Full text
Abstract:
In this dissertation we present a new and innovative approach to Digital Forensics analysis, based on Declarative Programming approaches, more specifically Constraint Programming methodologies, to describe and solve Digital Forensics problems. With this approach we allow for an intuitive, descriptive and more efficient method to analyze digital equipment data. The work described herein enables the description of a Digital Forensics Problem (DFP) as a Constraint Satisfaction Problem (CSP) and, with the help of a CSP solver, reach a solution to such problem, if it exists, which can be a set of e
APA, Harvard, Vancouver, ISO, and other styles
16

Doan, Thi Ngoc Canh. "Statistical Methods for Digital Image Forensics." Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0036.

Full text
Abstract:
L’explosion de la technologie d’imagerie numérique s’est considérablement accrue, posant d’énormes problèmes pour la sécurité de l’information. Grâce à des outils d'édition d'images à faible coût, l'omniprésence des images falsifiées est devenue une réalité incontournable. Cette situation souligne la nécessité d'étendre les recherches actuelles dans le domaine de la criminalistique numérique afin de restaurer la confiance dans les images numériques. Deux problèmes importants sont abordés dans cette thèse: l’estimation du facteur de qualité d’une image JPEG et la détection de la falsification d
APA, Harvard, Vancouver, ISO, and other styles
17

Di, Marino Grezia. "MATCHASH: Software per la Digital Forensics." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22832/.

Full text
Abstract:
La Digital Forensics, detta anche Scienza Digitale Forense, è una disciplina della scienza forense che si occupa di recuperare e analizzare materiali estratti dai dispositivi digitali. Inizialmente era denominata Computer Forensics perché i dati erano memorizzati su un computer. Questa disciplina si è evoluta dapprima in Digital Forensics poi a seconda del dispositivo o dell’ambito ha preso il nome di Mobile Forensics per l’analisi dei cellulari, Network Forensics per le reti, Web Forensics riferendosi al web, IoT forensics per il campo dell’Internet of Things, e così via. Ci sono software
APA, Harvard, Vancouver, ISO, and other styles
18

Karie, Nickson M. "Resolving Semantic Disparities in Digital Forensics." Thesis, University of Pretoria, 2016. http://hdl.handle.net/2263/57356.

Full text
Abstract:
Digital forensics is a growing field that is gaining popularity among many computer professionals, law enforcement agencies, investigators and other digital forensic practitioners. For this reason, several investigation process models have been developed to offer direction on how to recognize and preserve potential digital evidence obtained from a crime scene. However, the vast number of existing models and frameworks has added to the complexity of the digital forensic field. This situation has further created an environment replete with semantic disparities in the domain, which need to be res
APA, Harvard, Vancouver, ISO, and other styles
19

MARTURANA, FABIO. "Device classification in digital forensics triage." Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2014. http://hdl.handle.net/2108/214142.

Full text
Abstract:
Internet’s pervasiveness and the large availability of multimedia devices with networking capability have contributed to the global diffusion of cyber threats and cybercrimes, causing serious challenges from the digital forensic perspective. As a consequence, the potential amount of data which requires analysis is increasing, causing an urgent need for new forensic techniques and tools. Those currently in use, indeed, being more focused on full device extraction for some basic statistics than reducing and correlating data for case-relevant device identification, tend to be outdated. In t
APA, Harvard, Vancouver, ISO, and other styles
20

Al, Fahdi Mahmood. "Automated digital forensics and computer crime profiling." Thesis, University of Plymouth, 2016. http://hdl.handle.net/10026.1/8090.

Full text
Abstract:
Over the past two decades, technology has developed tremendously, at an almost exponential rate. While this development has served the nation in numerous different positive ways, negatives have also emerged. One such negative is that of computer crime. This criminality has even grown so fast as to leave current digital forensic tools lagging behind in terms of development, and capabilities to manage such increasing and sophisticated types of crime. In essence the time taken to analyse a case is huge and increasing, and cases are not fully or properly investigated. This results in an ever-incre
APA, Harvard, Vancouver, ISO, and other styles
21

Kohn, Michael Donovan. "Integrated digital forensic process model." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/25433.

Full text
Abstract:
The Information and Communications Technology (ICT) environment constitutes an integral part of our daily lives. Individual computer users and large corporate companies are increasingly dependent on services provided by ICT. These services range from basic communication to managing large databases with corporate client information. Within these ICT environments something is bound to go wrong for a number of reasons, which include an intentional attack on information services provided by an organisation. These organisations have in turn become interested in tracing the root cause of such an inc
APA, Harvard, Vancouver, ISO, and other styles
22

Schatz, Bradley Lawrence. "Digital evidence : representation and assurance." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16507/1/Bradley_Schatz_Thesis.pdf.

Full text
Abstract:
The field of digital forensics is concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. The complexity of such digital evidence is constantly increasing, as is the volume of data which might contain evidence. Current approaches to interpreting and assuring digital evidence rely implicitly on the use of tools and representations made by experts in addressing the concerns of juries and courts. Current forensics tools are best characterised as not easily verifiable, lacking in ease of interoperability, and burdensome on human process.
APA, Harvard, Vancouver, ISO, and other styles
23

Schatz, Bradley Lawrence. "Digital evidence : representation and assurance." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16507/.

Full text
Abstract:
The field of digital forensics is concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. The complexity of such digital evidence is constantly increasing, as is the volume of data which might contain evidence. Current approaches to interpreting and assuring digital evidence rely implicitly on the use of tools and representations made by experts in addressing the concerns of juries and courts. Current forensics tools are best characterised as not easily verifiable, lacking in ease of interoperability, and burdensome on human process. T
APA, Harvard, Vancouver, ISO, and other styles
24

Watson, Michael Charles. "Certifying Computer Forensics Skills." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9131.

Full text
Abstract:
Computer forensics is an ever-growing technological field of complexity and depth. Individuals must strive to keep learning and growing their skills as they help combat cybercrime throughout the world. This study attempts to establish a method of evaluating conceptual expertise in computer forensics to help indicate whether or not an individual understands the five basic phases of computer forensics: preparation, seizure of evidence, acquisition of data, analysis of data, and reporting the findings of the analysis. A survey was presented to a university class of 30 students taking a computer f
APA, Harvard, Vancouver, ISO, and other styles
25

Thai, Thanh Hai. "Statistical modeling and detection for digital image forensics." Thesis, Troyes, 2014. http://www.theses.fr/2014TROY0024/document.

Full text
Abstract:
Le XXIème siècle étant le siècle du passage au tout numérique, les médias digitaux jouent maintenant un rôle de plus en plus important dans la vie de tous les jours. De la même manière, les logiciels sophistiqués de retouche d’images se sont démocratisés et permettent aujourd’hui de diffuser facilement des images falsifiées. Ceci pose un problème sociétal puisqu’il s’agit de savoir si ce que l’on voit a été manipulé. Cette thèse s'inscrit dans le cadre de la criminalistique des images numériques. Deux problèmes importants sont abordés : l'identification de l'origine d'une image et la détection
APA, Harvard, Vancouver, ISO, and other styles
26

Lin, Xufeng. "Digital image forensics based on sensor pattern noise." Thesis, University of Warwick, 2016. http://wrap.warwick.ac.uk/89715/.

Full text
Abstract:
With the advent of low-cost and high-quality digital imaging devices and the availability of user-friendly and powerful image-editing software, digital images can be easily manipulated without leaving obvious traces. The credibility of digital images is often challenged when they are presented as crucial evidence for news photography, scientific discovery, law enforcement, etc. In this context, digital image forensics emerges as an essential approach for ensuring the credibility of digital images. Sensor pattern noise mainly consists of the photo response non-uniformity noise arising primarily
APA, Harvard, Vancouver, ISO, and other styles
27

Hansen, Tone. "A Digital Tool to Improve the Efficiency of IT Forensic Investigations." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40232.

Full text
Abstract:
The IT forensic process causing bottlenecks in investigations is an identified issue, with multiple underlying causes – one of the main causes being the lack of expertise among those responsible for ordering IT forensic investigations. The focus of the study is to create and evaluate a potential solution for this problem, aiming to answer research questions related to a suitable architecture, structure and design of a digital tool that would assist individuals in creating IT forensic orders. This work evaluates concepts of such a digital tool. This is done using a grounded theory approach, whe
APA, Harvard, Vancouver, ISO, and other styles
28

Alqahtany, Saad. "A forensically-enabled IaaS cloud computing architecture." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9508.

Full text
Abstract:
Cloud computing has been advancing at an intense pace. It has become one of the most important research topics in computer science and information systems. Cloud computing offers enterprise-scale platforms in a short time frame with little effort. Thus, it delivers significant economic benefits to both commercial and public entities. Despite this, the security and subsequent incident management requirements are major obstacles to adopting the cloud. Current cloud architectures do not support digital forensic investigators, nor comply with today’s digital forensics procedures – largely due to t
APA, Harvard, Vancouver, ISO, and other styles
29

Al, Mutawa Noora Ahmad Khurshid. "Integrating behavioural analysis within the digital forensics investigation process." Thesis, University of Central Lancashire, 2018. http://clok.uclan.ac.uk/25412/.

Full text
Abstract:
This programme of research focused on incorporating Behavioural Analysis (BA) within the digital forensics investigation process. A review of previously developed digital forensics investigation models indicated a lack of sufficient consideration of the behavioural and motivational dimensions of offending, and the way in which digital evidence can be used to address these issues during the investigation process. This programme of research aimed to build on previous work by scientific researchers and investigators by developing a digital forensics investigation model which incorporates greater
APA, Harvard, Vancouver, ISO, and other styles
30

Alfraih, Areej S. "Feature extraction and clustering techniques for digital image forensics." Thesis, University of Surrey, 2015. http://epubs.surrey.ac.uk/808306/.

Full text
Abstract:
This thesis proposes an adaptive algorithm which applies feature extraction and clustering techniques for cloning detection and localization in digital images. Multiple contributions have been made to test the performance of different feature detectors for forensic use. The �first contribution is to improve a previously published algorithm by Wang et al. by localizing tampered regions using the grey-level co-occurrence matrix (GLCM) for extracting texture features from the chromatic component of an image (Cb or Cr component). The main trade-off� is a diminishing detection accuracy as the regio
APA, Harvard, Vancouver, ISO, and other styles
31

Necaise, Nathan Joseph. "Empirical analysis of disk sector prefixes for digital forensics." Master's thesis, Mississippi State : Mississippi State University, 2007. http://library.msstate.edu/etd/show.asp?etd=etd-03282007-151218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Samsuddin, Samsuddin Wira Bin Tu Manghui. "Digital forensics curriculum for undergraduate and master graduate students." [Cedar City, Utah] : Southern Utah University, 2009. http://unicorn.li.suu.edu/ScholarArchive/ForensicScience/SamsuddinWira.pdf.

Full text
Abstract:
Thesis (M.S.)--Southern Utah University, 2009.<br>Title from PDF title page. "Thesis presented to the faculty of the Graduate School of Southern Utah University in partial fulfillment of the requirements for the degree of Master of Science in Forensic Science, Computer Forensics Emphasis." Manghui Tu, Advisor. Includes bibliographical references (p. 83-88).
APA, Harvard, Vancouver, ISO, and other styles
33

Berthet, Alexandre. "Deep learning methods and advancements in digital image forensics." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS252.

Full text
Abstract:
Le volume de données visuelles numériques augmente considérablement d'année en années. En parallèle, l’édition d'images est devenue plus facile et plus précise. Les modifications malveillantes sont donc plus accessibles. La criminalistique des images fournit des solutions pour garantir l’authenticité des données visuelles numériques. Tout d’abord, les solutions étaient des méthodes classiques basées sur les artéfacts produits lors de la création d’une image numérique. Puis, comme pour d’autres domaines du traitement d’images, les méthodes sont passées à l’apprentissage profond. Dans un premier
APA, Harvard, Vancouver, ISO, and other styles
34

Ademu, Inikpi. "A comprehensive digital forensics investigation model and guidelines for establishing admissible digital evidence." Thesis, University of East London, 2013. http://roar.uel.ac.uk/3992/.

Full text
Abstract:
Technology systems are attacked by offenders using digital devices and networks to facilitate their crimes and hide their identities, creating new challenges for digital investigators. Malicious programs that exploit vulnerabilities also serve as threats to digital investigators. Since digital devices such as computers and networks are used by organisations and digital investigators, malicious programs and risky practices that may contaminate the integrity of digital evidence can lead to loss of evidence. For some reasons, digital investigators face a major challenge in preserving the integrit
APA, Harvard, Vancouver, ISO, and other styles
35

Solanke, Abiodun Abdullahi <1983&gt. "Digital Forensics AI: on Practicality, Optimality, and Interpretability of Digital Evidence Mining Techniques." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2022. http://amsdottorato.unibo.it/10400/1/SOLANKE-ABIODUN-ABDULLAHI-Tesi.pdf.

Full text
Abstract:
Digital forensics as a field has progressed alongside technological advancements over the years, just as digital devices have gotten more robust and sophisticated. However, criminals and attackers have devised means for exploiting the vulnerabilities or sophistication of these devices to carry out malicious activities in unprecedented ways. Their belief is that electronic crimes can be committed without identities being revealed or trails being established. Several applications of artificial intelligence (AI) have demonstrated interesting and promising solutions to seemingly intractable societ
APA, Harvard, Vancouver, ISO, and other styles
36

Kruger, Jaco-Louis. "Digital forensic readiness for IOT devices." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73385.

Full text
Abstract:
The Internet of Things (IoT) has evolved to be an important part of modern society. IoT devices can be found in several environments such as smart homes, transportation, the health sector, smart cities and even facilitates automation in organisations. The increasing dependence on IoT devices increases the possibility of security incidents in the physical or cyber environment. Traditional methods of digital forensic (DF) investigations are not always applicable to IoT devices due to their limited data processing resources. A possible solution for conducting forensic investigations on IoT device
APA, Harvard, Vancouver, ISO, and other styles
37

Chabot, Yoan. "Construction, enrichment and semantic analysis of timelines : application to digital forensics." Thesis, Dijon, 2015. http://www.theses.fr/2015DIJOS037/document.

Full text
Abstract:
Obtenir une vision précise des évènements survenus durant un incident est un objectif difficile à atteindre lors d'enquêtes de criminalistique informatique. Le problème de la reconstruction d'évènements, ayant pour objectif la construction et la compréhension d'une chronologie décrivant un incident, est l'une des étapes les plus importantes du processus d'investigation. La caractérisation et la compréhension complète d'un incident nécessite d'une part d'associer à chaque fragment d'information sa signification passée, puis d'établir des liens sémantiques entre ces fragments. Ces tâches nécessi
APA, Harvard, Vancouver, ISO, and other styles
38

Lawgaly, Ashref. "Digital camera identification using sensor pattern noise for forensics applications." Thesis, Northumbria University, 2017. http://nrl.northumbria.ac.uk/32314/.

Full text
Abstract:
Nowadays, millions of pictures are shared through the internet without applying any authentication system. This may cause serious problems, particularly in situations where the digital image is an important component of the decision making process for example, child pornography and movie piracy. Motivated by this, the present research investigates the performance of estimating Photo Response Non-Uniformity (PRNU) and developing new estimation approaches to improve the performance of digital source camera identification. The PRNU noise is a sensor pattern noise characterizing the imaging device
APA, Harvard, Vancouver, ISO, and other styles
39

Homem, Irvin. "Towards Automation in Digital Investigations : Seeking Efficiency in Digital Forensics in Mobile and Cloud Environments." Licentiate thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-130742.

Full text
Abstract:
Cybercrime and related malicious activity in our increasingly digital world has become more prevalent and sophisticated, evading traditional security mechanisms. Digital forensics has been proposed to help investigate, understand and eventually mitigate such attacks. The practice of digital forensics, however, is still fraught with various challenges. Some of the most prominent of these challenges include the increasing amounts of data and the diversity of digital evidence sources appearing in digital investigations. Mobile devices and cloud infrastructures are an interesting specimen, as they
APA, Harvard, Vancouver, ISO, and other styles
40

Hannay, Peter. "A non-device specific framework for the development of forensic locational data analysis procedure for consumer grade small and embedded devices." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2017. https://ro.ecu.edu.au/theses/2026.

Full text
Abstract:
Portable and wearable computing devices such as smart watches, navigation units, mobile phones, and tablet computers commonly ship with Global Navigation Satellite System (GNSS) supported locational awareness. Locational functionality is no longer limited to navigation specific devices such as satellite navigation devices and location tracking systems. Instead the use of these technologies has extended to become secondary functionality on many devices, including mobile phones, cameras, portable computers, and video game consoles. The increase in use of location aware technology is of use to fo
APA, Harvard, Vancouver, ISO, and other styles
41

Brandt, Johan, and Oscar Wärnling. "Addressing the Digital Forensic Challenges Within Modern Law Enforcement : A study of digital forensics and organizational buying behavior from a DF-company perspective." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279595.

Full text
Abstract:
Today’s law enforcement agencies are presented with challenges regarding how to navigate the rapidly changing technical landscape. The proliferation of digital devices in society has presented opportunities for modern criminals, resulting in substantial changes in criminal behavior. Digital devices have, thus, become a crucial piece of evidence within forensic investigation processes, which has caused the field of digital forensics to emerge as a central part of modern law enforcement. However, law enforcement is experiencing substantial challenges in regard to handling the complexity of moder
APA, Harvard, Vancouver, ISO, and other styles
42

Van, Ramesdonk Paul. "Continued forensic development - investigation into current trends and proposed model for digital forensic practitioners." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/20707.

Full text
Abstract:
Continuous professional development has been looked at in many professions over the years, most notably in primary and secondary education and in the medical fields. With digital forensics being cast into the limelight due to the rapid advancements in technology, academic institutions have added courses to address the void created by the boom in the industry. Little research has been done to address the issues that have now become apparent concerning continued learning in this field. The purpose of this research was to investigate the kinds of frameworks and methods used in other professions,
APA, Harvard, Vancouver, ISO, and other styles
43

Börjesson, Holme, and Filiph Lindskog. "Går det att köpa personuppgifter på bilskroten? : Ett arbete om digital forensik på begagnade bildelar." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42369.

Full text
Abstract:
I moderna bilar lagras ofta data från användaren av bilen då en mobiltelefon eller annan enhet parkopplas genom Bluetooth- eller USB-anslutning. I de fall dessa data innehåller personuppgifter kan de vara intressanta i en utredning samt vara värda att skydda ur ett integritetsperspektiv. Vad händer med dessa data då bilen skrotas? När en bil skrotas monteras den ner och de delar som går att tjäna pengar på säljs av bildemonteringsföretaget. Det kan gälla allt från stötdämpare, hjul och rattar, till elektroniska komponenter och multimediaenheter. I detta arbete utvanns personuppgifter ur tre så
APA, Harvard, Vancouver, ISO, and other styles
44

Brand, Murray. "Analysis avoidance techniques of malicious software." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2010. https://ro.ecu.edu.au/theses/138.

Full text
Abstract:
Anti Virus (AV) software generally employs signature matching and heuristics to detect the presence of malicious software (malware). The generation of signatures and determination of heuristics is dependent upon an AV analyst having successfully determined the nature of the malware, not only for recognition purposes, but also for the determination of infected files and startup mechanisms that need to be removed as part of the disinfection process. If a specimen of malware has not been previously extensively analyzed, it is unlikely to be detected by AV software. In addition, malware is becomin
APA, Harvard, Vancouver, ISO, and other styles
45

Mohammed, Hussam J. "Automated identification of digital evidence across heterogeneous data resources." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12839.

Full text
Abstract:
Digital forensics has become an increasingly important tool in the fight against cyber and computer-assisted crime. However, with an increasing range of technologies at people's disposal, investigators find themselves having to process and analyse many systems with large volumes of data (e.g., PCs, laptops, tablets, and smartphones) within a single case. Unfortunately, current digital forensic tools operate in an isolated manner, investigating systems and applications individually. The heterogeneity and volume of evidence place time constraints and a significant burden on investigators. Exampl
APA, Harvard, Vancouver, ISO, and other styles
46

Delport, Waldo. "Forensic evidence isolation in clouds." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/33490.

Full text
Abstract:
Cloud computing is gaining acceptance and also increasing in popularity. Organisations often rely on cloud resources as an effective replacement for their `in-house' computer systems. In the cloud, virtual resources are provided from a larger pool of resources, these resources being available to multiple different clients. When something suspicious happens within a digital environment, a digital forensic investigation may be conducted to gather information about the event. When conducting such an investigation digital forensic procedures are followed. These procedures involve the ste
APA, Harvard, Vancouver, ISO, and other styles
47

Hales, Gavin. "Assisting digital forensic analysis via exploratory information visualisation." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113.

Full text
Abstract:
Background: Digital forensics is a rapidly expanding field, due to the continuing advances in computer technology and increases in data stage capabilities of devices. However, the tools supporting digital forensics investigations have not kept pace with this evolution, often leaving the investigator to analyse large volumes of textual data and rely heavily on their own intuition and experience. Aim: This research proposes that given the ability of information visualisation to provide an end user with an intuitive way to rapidly analyse large volumes of complex data, such approached could be ap
APA, Harvard, Vancouver, ISO, and other styles
48

Jacobsson, Emma, and Wistad Ebba Andersson. "Digital bevisning : En definition." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44963.

Full text
Abstract:
The digitalization of society has contributed to a more convenient lifestyle for the Swedishpopulation. Our everyday life includes digital technology that saves information about us and our actions from digital devices. Collected digital information can be admissible as evidence in a legal process. Despite the increase in crimes involving IT, Sweden seems to lack an official description for the concept of digital evidence. The purpose of this report is to propound two definitions: one for the general public and one more suitable for specific technical usage by people in the field. This report
APA, Harvard, Vancouver, ISO, and other styles
49

Barone, Joshua M. "Automated Timeline Anomaly Detection." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1609.

Full text
Abstract:
Digital forensics is the practice of trained investigators gathering and analyzing evidence from digital devices such as computers and smart phones. On these digital devices, it is possible to change the time on the device for a purpose other than what is intended. Currently there are no documented techniques to determine when this occurs. This research seeks to prove out a technique for determining when the time has been changed on forensic disk image by analyzing the log files found on the image. Out of this research a tool is created to perform this analysis in automated fashion. This tool
APA, Harvard, Vancouver, ISO, and other styles
50

Alrumaithi, A. M. "Prioritisation in digital forensics : a case study of Abu Dhabi Police." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/8936/.

Full text
Abstract:
The main goal of this research is to investigate prioritization process in digital forensics departments in law enforcement organizations. This research is motivated by the fact that case prioritisation plays crucial role to achieve efficient operations in digital forensics departments. Recent years have witnessed the widespread use of digital devices in every aspect of human life, around the globe. One of these aspects is crime. These devices have became an essential part of every investigation in almost all cases handled by police. The reason behind their importance lies in their ability to
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!