Academic literature on the topic 'Forensic investigation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Forensic investigation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Forensic investigation"

1

Safie, Sairul Izwan, and Syah Reezal Md Bashah. "A Comprehensive Review of the Evolution and Future Directions of Digital Forensic Investigation Model." International Journal of Emerging Technology and Advanced Engineering 13, no. 7 (July 16, 2023): 1–10. http://dx.doi.org/10.46338/ijetae0723_01.

Full text
Abstract:
Digital forensics investigations play an essential role in modern law enforcement, national security, and civil litigation. To conduct a successful investigation, it is crucial to choose an appropriate digital forensics investigation model that fits the investigation's context, scope, purpose, and methods. This paper presents an overview of the main factors that should be considered when selecting a digital forensics investigation model, including the type of incident, legal and ethical requirements, technical and operational capabilities, and complexity of the scenario. Additionally, this paper describes 11 digital forensics investigation models, ranging from simple to complex, each with its own strengths and weaknesses. By understanding the advantages and limitations of each model, digital forensics professionals can choose the most suitable model for their specific investigation. Keywords—Digital forensics investigations, Forensic analysis, Investigation models, Forensics Model
APA, Harvard, Vancouver, ISO, and other styles
2

Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (April 2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.

Full text
Abstract:
Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirements, or by destroying the evidence. Therefore, successful forensic investigations require understanding the possible anti-forensic issues during the investigation. In this paper, the authors present a new method for guiding digital forensics investigations considering the anti-forensics based on goal-driven requirements engineering methodologies, in particular KAOS. Methodologies like KAOS facilitate modeling and reasoning about goals, requirements and obstacles, as well as their operationalization and responsibility assignments. The authors believe that this new method will lead in the future to better management and organization of the various steps of forensics investigations in cyberspace as well as provide more robust grounds for reasoning about forensic evidence.
APA, Harvard, Vancouver, ISO, and other styles
3

Sutikno, Tole. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 2 (August 1, 2024): 321. http://dx.doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
<p>Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic Detective, XRY by MSAB, Magnet AXIOM, SPF Pro by SalvationDATA, MOBILedit Forensic Express, and EnCase Forensic employ both physical and logical techniques to retrieve data from mobile devices. These advanced tools offer a structured approach to tackling digital crimes effectively. We compare dependability, speed, compatibility, data recovery accuracy, and reporting. Mobile-network forensics ensures data acquisition, decryption, and analysis success. Conclusions show that Android mobile forensics tools for digital crime investigations are diverse and have different capabilities. Mobile forensics software offers complete solutions, but new data storage and encryption methods require constant development. The continuous evolution of forensic software tools and a comprehensive tool classification system could further enhance digital crime investigation capabilities.</p>
APA, Harvard, Vancouver, ISO, and other styles
4

P A, Safuwan Ali, and Kavitha R. "Unraveling Cyber Threats: The Role of Forensic Investigation in Cyber Security." International Journal of Multidisciplinary Research in Science, Engineering and Technology 7, no. 05 (May 22, 2024): 10258–60. http://dx.doi.org/10.15680/ijmrset.2024.0705108.

Full text
Abstract:
In today's digital landscape, cyber threats pose significant risks to organizations worldwide, demanding robust cybersecurity measures. Forensic investigation is pivotal in identifying, analyzing, and mitigating these threats, providing insights into their nature and impact for effective incident response. Leveraging forensic techniques and tools empowers organizations to fortify defense strategies and resilience against evolving threats. Cyber forensics encompasses diverse domains such as digital, data, system, and network forensics, crucial for legally admissible evidence presentation. System forensics focuses on standalone machine investigations, while network forensics scrutinizes network events. Data forensics involves analyzing volatile and non-volatile data, while proactive forensics facilitates ongoing evidence collection for enhanced preparedness. Email forensics addresses the evidential role of emails in forensic investigations.
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Puneet, Deepak Arora, and T. Sakthivel. "Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications." International Journal of Digital Crime and Forensics 12, no. 3 (July 2020): 58–76. http://dx.doi.org/10.4018/ijdcf.2020070105.

Full text
Abstract:
Nowadays, mobile cloud applications have attracted millions of smartphone users due to the proliferation of cyber technologies and a wide range of applications. Mobile cloud forensic investigation methodologies need tremendous growth due to the increasing crime incidents. The forensic readiness model plays a significant role in the forensic investigation framework by ensuring the ease of investigation to the forensic investigator. The existing forensic readiness supports either the mobile device or cloud environment, which lacks to prepare the information for the investigation. This article presents a mobile cloud forensic readiness process model to identify the factors and prepare the information that effectively supports forensic investigations. The proposed model involves requirements for the mobile cloud forensics from multiple perspectives with the aim of developing the forensic-ready system. As a result, the proposed forensic readiness model enables the mobile cloud forensic to improve the accuracy of investigation as well as reduces the investigation time significantly.
APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.

Full text
Abstract:
Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic evidence and the legal procedures to be adhered to in evidence gathering at a digital crime scene, presenting at the law courts have proven to be challenging and in some instances inadmissible. Following legal procedures in evidence gathering at a digital crime scene is critical for admissibility and prosecution. This paper aims to discuss digital forensics investigations jurisprudence in relation to distributed digital evidence. For the study to be relevant to policy and practice, forensic tools and frameworks, legal and ethical obligations, and digital evidence handling and admissibility are highlighted. This paper does not follow any forensic investigations process; but rather discusses the need for development and implementation of unique frameworks that could be utilised to gather distributed digital evidence required for admissibility in court. Keywords - Digital forensics investigations; Digital evidence; Jurisprudence BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Kpakpo Brown (2022): Digital Forensic and Distributed Evidence Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 357-362 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P57
APA, Harvard, Vancouver, ISO, and other styles
7

Baroto, Wishnu Agung. "Advancing Digital Forensic through Machine Learning: An Integrated Framework for Fraud Investigation." Asia Pacific Fraud Journal 9, no. 1 (June 1, 2024): 1–16. http://dx.doi.org/10.21532/apfjournal.v9i1.346.

Full text
Abstract:
The rise of cybercrime and cyber-related crime encourages efficient digital forensic investigations more crucial than ever before. Traditional investigation methods can be time-consuming, costly, and resource-intensive, while machine learning algorithms have the potential to reduce the complexity by promoting automation and investigation capabilities. This study begins with an analysis of digital forensics framework using a document analysis methodology. Moreover, exploring current practice and potential implementation of machine learning in digital forensics for fraud investigation is demonstrated through the features of Autopsy 4.15.0, a widely known digital forensics tool. The findings suggest the implementation of a comprehensive digital forensic framework that prioritizes the interpretation phase, with the support of machine learning capabilities. At present, machine learning mainly supports the analysis phase, which happens to be the most time-intensive process of digital forensic investigations. Furthermore, as fraud investigation has a role of fraud detection and prevention, current digital forensics procedures do not support the fraud detection and prevention process, despite the potential for machine learning to support this through pattern recognition.These discoveries are particularly significant in the fight against fraudulent activities, such as tax fraud, data fraud, financial fraud, and asset misappropriation, in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Abdullah. "Evaluating Network Forensics Applying Advanced Tools." International Journal of Advanced Engineering, Management and Science 9, no. 4 (2023): 01–09. http://dx.doi.org/10.22161/ijaems.94.1.

Full text
Abstract:
Network forensics comes under the domain of digital forensics and deals with evidences left behind on the networkiafter a cyber-attack. It is indication of the weakness that led to the crime and the possible cause. Network focused research comes up with many challenges which involves the collection, storage, content, privacy, confiscation and the admissibility. It is important and critical for any network forensic researcher or the investigator to consider adopting efficient forensic network investigation framework or the methodologies in order to improve investigation process. The main aim of this research contribution was to do a comprehensive analysis of concepts of networks forensics through extensive investigation and by analyzing various methodologies and associated tools which should be used in the network forensic investigations. Detailed and in depth analysis of concepts of network forensic investigation on a designed/conceived network architecture was carried out which was then followed by analyzing various methodologies and tools employed. An innovative framework for the investigation was designed which can be used by any forensic expert. The acquired data was analyzed by using information, strategizing and collecting evidence and by analyzing and reporting of the methodologies on the conceptualized network. Consequently, it led to the researcher to adopt and utilize a powerful and efficient forensic network methodology that will ultimately help in improving the investigation process and providing required tools/techniques along with the requisite guidelines that will determine the approach, methods, and strategies which are to be used for networkiforensiciprocess to be followed and be executed with the use of relevant tools that will tend to help in the simplification and improvement of the forensics investigation process.
APA, Harvard, Vancouver, ISO, and other styles
9

Charaya, Nancy. "Microbial Forensic’s - Microbes as a part of Forensic Investigation." Journal of Advanced Medical and Dental Sciences Research 4, no. 4 (August 2016): 32–37. http://dx.doi.org/10.21276/jamdsr.2016.4.4.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Sandeep Kumar, and Mazhar Khaliq. "Design and development of software quality forensics framework and model." Multidisciplinary Science Journal 6, no. 7 (January 16, 2024): 2024111. http://dx.doi.org/10.31893/multiscience.2024111.

Full text
Abstract:
The illicit activist tampers the software for malcious purposes. The process of forensics examining and gathering evidence for software accused in forensic laboratories presents challenges in terms of software quality. Therefore, it is crucial to design and develop a framework, model, and dedicated standards for the forensic analysis of software quality. These resources can be employed for investigations, legal proceedings, as well as establishing criteria and standards for both past and present scenarios. The aim of the research work is to design a software-quality forensics framework for forensic investigation to the quality of software. The research primarily concentrates on developing a model for software quality assessment and identifying the pertinent existing standards through the conceptual framework of software quality forensics. The implementation of software quality forensics has improved the efficiency and effectiveness in investigating and managing incidents related to software quality. The proposed framework for software quality forensics allows for the evaluation and assessment of quality issues within specific software systems. To complement the software quality forensic framework, a comparative analysis has been conducted between existing software quality models and the proposed software quality forensic model.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Forensic investigation"

1

Montasari, Reza. "The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice." Thesis, University of Derby, 2016. http://hdl.handle.net/10545/620799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chung, Cheuk-fai Bell. "The use of forensic hypnosis in criminal investigation." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B31979300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Law, Yuet-wing, and 羅越榮. "Investigation models for emerging computer forensic challenges." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Srinivasan, Arunshankar. "Forensic information management system." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3356.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2004.
Title from document title page. Document formatted into pages; contains xii, 88 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 87-88).
APA, Harvard, Vancouver, ISO, and other styles
5

Etow, Tambue Ramine. "IMPACT OF ANTI-FORENSICS TECHNIQUES ON DIGITAL FORENSICS INVESTIGATION." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97116.

Full text
Abstract:
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly because forensic investigations are based on artifacts left oncomputers and other digital devices. In recent times, perpetrators of computer crimesare getting abreast of the digital forensics dynamics hence, capacitated to use someanti-forensics measures and techniques to obfuscate the investigation processes.Incases where such techniques are employed, it becomes extremely difficult, expensive and time consuming to carry out an effective investigation. This might causea digital forensics expert to abandon the investigation in a pessimistic manner.ThisProject work serves to practically demonstrate how numerous anti-forensics can bedeployed by the criminals to derail the smooth processes of digital forensic investigation with main focus on data hiding and encryption techniques, later a comparativestudy of the effectiveness of some selected digital forensics tools in analyzing andreporting shreds of evidence will be conducted.
APA, Harvard, Vancouver, ISO, and other styles
6

鍾灼輝 and Cheuk-fai Bell Chung. "The use of forensic hypnosis in criminal investigation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31979300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Parmjit. "Web based forensic information management system." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4721.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2006.
Title from document title page. Document formatted into pages; contains xiii, 316 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 315-316).
APA, Harvard, Vancouver, ISO, and other styles
9

Janssens, Lies Marjolijn. "From the crime scene to the autopsy table: comparing the different steps involved between the United States of America and Belgium." Thesis, Boston University, 2013. https://hdl.handle.net/2144/21181.

Full text
Abstract:
Thesis (M.S.F.S.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
In Belgium, approximately 75 homicides a year go unnoticed. In addition it is estimated that 5 - 10% of the so-called natural deaths are not natural at all. This amounts to 5,000 – 10,000 deaths a year with an incorrect cause of death. Both Belgium – composed of three regions, three communities, and ten provinces – and the United States of America – divided into 50 states – are overseen by a Federal Government, and their police system consist of multiple law enforcement agencies. When looking from a distance, more similarities than differences are seen for the organization of law enforcement agencies. However, differences become apparent when analyzing the responsibilities of the different agencies during crime scene processing and evidence collection. Seen the scope of the forensic science program, the focus will more specifically be on the process, procedures, and actors involved. The goal of this thesis is to (a) analyze the Belgian and U.S. crime scene investigation system, (b) compare the two systems to one another, (c) discuss the weaknesses and strengths behind each system, and finally (d) come up with recommendations. Existing issues will also be evaluated and their impact will be discussed. To achieve the above mentioned goals, information was obtained through literature review and interviews with experts. During the interviews information (e.g. books), not available to the general public, was obtained. Crime scene investigation, for both the U.S. and Belgian system, can be divided into 5 different steps: the initial notification, the first response team, the investigation of the crime scene (documenting, collecting, and processing evidence), the analysis of collected evidence, and the autopsy. In both systems, first responders and emergency medical services will be the first actors present at the scene. Although most procedures and actors involved in the investigation of a crime scene are similar between the United States of America and Belgium, some differences cannot be overlooked. These differences are: the person in charge of completing the death certificate, determining whether or not jurisdiction is accepted, the educational background and composition of the crime scene team, the investigation of the deceased, the requirements needed to become a forensic pathologist, and the cases in which an autopsy is systematically performed. Comparing both crime scene investigation systems showed that each system has its own strengths, weaknesses, and issues. The comparison also showed that both systems can learn from one another, since the combination of already existing processes and procedures, from both crime scene investigation systems, was used to create an “ideal” crime scene investigation system.
2031-01-01
APA, Harvard, Vancouver, ISO, and other styles
10

Marziale, Lodovico. "Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.

Full text
Abstract:
Digital forensics is the science concerned with discovering, preserving, and analyzing evidence on digital devices. The intent is to be able to determine what events have taken place, when they occurred, who performed them, and how they were performed. In order for an investigation to be effective, it must exhibit several characteristics. The results produced must be reliable, or else the theory of events based on the results will be flawed. The investigation must be comprehensive, meaning that it must analyze all targets which may contain evidence of forensic interest. Since any investigation must be performed within the constraints of available time, storage, manpower, and computation, investigative techniques must be efficient. Finally, an investigation must provide a coherent view of the events under question using the evidence gathered. Unfortunately the set of currently available tools and techniques used in digital forensic investigations does a poor job of supporting these characteristics. Many tools used contain bugs which generate inaccurate results; there are many types of devices and data for which no analysis techniques exist; most existing tools are woefully inefficient, failing to take advantage of modern hardware; and the task of aggregating data into a coherent picture of events is largely left to the investigator to perform manually. To remedy this situation, we developed a set of techniques to facilitate more effective investigations. To improve reliability, we developed the Forensic Discovery Auditing Module, a mechanism for auditing and enforcing controls on accesses to evidence. To improve comprehensiveness, we developed ramparser, a tool for deep parsing of Linux RAM images, which provides previously inaccessible data on the live state of a machine. To improve efficiency, we developed a set of performance optimizations, and applied them to the Scalpel file carver, creating order of magnitude improvements to processing speed and storage requirements. Last, to facilitate more coherent investigations, we developed the Forensic Automated Coherence Engine, which generates a high-level view of a system from the data generated by low-level forensics tools. Together, these techniques significantly improve the effectiveness of digital forensic investigations conducted using them.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Forensic investigation"

1

Okedeji, Abioye. Computer forensic investigation. London: University of East London, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kelmen, Davies. Forensic ICT investigation. Nairobi, Kenya: LawAfrica, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

M, Mudge Stephen, ed. Environmental forensic investigation. Boca Raton: Taylor & Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Johnson, Thomas Alfred. Forensic computer crime investigation. Boca Raton: CRC, Taylor & Francis, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Beveridge, Alexander. Forensic investigation of explosions. 2nd ed. Boca Raton, FL: CRC Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alexander, Beveridge, ed. Forensic investigation of explosions. London: Bristol, Penn., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Glass, Susan. Forensic investigator. Chicago, Ill: Raintree, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Muda, Azah Kamilah, Yun-Huoy Choo, Ajith Abraham, and Sargur N. Srihari, eds. Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05885-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tilley, Nick. Forensic science and crime investigation. London: Police Research Group, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Becker, Ronald F. Underwater Forensic Investigation. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Forensic investigation"

1

Wagner, Scott A. "Forensic Experts." In Death Investigation, 263–68. 2nd ed. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.4324/9780429318665-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ramsden, Jeremy. "Forensic Investigation." In Computational Biology, 373–77. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-030-45607-8_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Geradts, Zeno, and Jurrien Bijhold. "Forensic Video Investigation." In Multimedia Video-Based Surveillance Systems, 3–12. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4327-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Price, Richard D. "Forensic Fire Investigation." In Forensic Science Education and Training, 57–72. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118689196.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Krause, Benno, Kim-Kwang Raymond Choo, and Nhien-An Le-Khac. "PyBit Forensic Investigation." In Studies in Big Data, 125–74. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16127-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seta, Sueshige, Hajime Sato, and Buntaro Miyake. "Forensic Hair Investigation." In Forensic Science Progress, 47–166. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-69403-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, J. H. "Forensic DNA Investigation." In Handbook of DNA Profiling, 1–26. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9364-2_57-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, J. H. "Forensic DNA Investigation." In Handbook of DNA Profiling, 3–28. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-4318-7_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aimutis, William R., and Michael A. Mortenson. "Food Forensic Investigation." In Food Science Text Series, 615–32. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-45776-5_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Briem Stamm, Alan Diego, Marta Alicia Fernandez Iriarte, and Juan Esteban Palmieri. "Forensic Odontology." In Manual of Crime Scene Investigation, 267–80. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.4324/9781003129554-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Forensic investigation"

1

Nikoloska, Svetlana, and Marija Gjosheva. "COMPUTER FORENSIC IN FUNCTION OF CRIMINAL INVESTIGATION." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p25.

Full text
Abstract:
Computer forensics is increasingly finding its place in the criminal investigation of criminal offenses in order to shed light on and provide the evidence necessary to initiate criminal proceedings against the perpetrators of crimes that have misused computer technology in criminal activities. Criminal investigation is a procedure of using tactics, techniques and methods aimed at detecting, clarifying and providing evidence through legally prescribed operational-tactical measures and actions, investigative actions and special investigative measures. The Macedonian legislator in the criminal procedural legislation envisages measures and actions for providing electronic evidence which is relevant in computer crimes, but also in specific criminal situations electronic evidence has its meaning in the process of clarification of other classic and economic crimes. This paper analyzes the steps and procedures for extracting, processing and presenting electronic evidence that represent data contained in computer devices, data transmitted through computer systems and networks in order to adapt them to a form acceptable to judicial authorities based on the analysis of all evidence bases the verdicts on the perpetrators who are charged with a specific computer or other crime. An analysis of the actions of the competent investigative and judicial bodies in the process from detection to verdict is made by analyzing reported, accused and convicted perpetrators of the most committed computer crimes, but an analysis will be made for the need of electronic evidence in other crimes through analysis of case. Keywords: Computer forensics, Forensic research, Computer devices, Electronic evidence, Perpetrators of crime.
APA, Harvard, Vancouver, ISO, and other styles
2

Mumba, Emilio Raymond, and H. S. Venter. "Mobile forensics using the harmonised digital forensic investigation process." In 2014 Information Security for South Africa (ISSA). IEEE, 2014. http://dx.doi.org/10.1109/issa.2014.6950491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sargand, S. M., I. S. Khoury, and J. L. Figueroa. "Forensic Investigation of Sections." In Fourth Forensic Engineering Congress. Reston, VA: American Society of Civil Engineers, 2006. http://dx.doi.org/10.1061/40853(217)23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Kumar Shanu, Annie Irfan, and Neelam Dayal. "Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khmelnitskaya, Tatyana Vladimirovna, and Stanislav Evgenievich Nesterenko. "SOURCES OF CRIMINALISTIC "HYPOTHESES" VERSIONS DURING THE INVESTIGATION OF THE MURDER." In Themed collection of papers from Foreign International Scientific Conference «Trends in the development of science and Global challenges» Ьу НNRI «National development» in cooperation with AFP. April 2023. - Managua (Nicaragua). Crossref, 2023. http://dx.doi.org/10.37539/230415.2023.58.39.026.

Full text
Abstract:
The problems that affect the effectiveness of the murder investigation are considered. The concept of "investigative (criminalistic) version" is investigated. The sources of forensic versions that can be used by the investigator during the investigation of the murder have been studied.
APA, Harvard, Vancouver, ISO, and other styles
6

Mendi, Deniz, Fatih Kahraman, and Cengiz Huroglu. "IYON: Forensic image investigation software." In 2012 20th Signal Processing and Communications Applications Conference (SIU). IEEE, 2012. http://dx.doi.org/10.1109/siu.2012.6204846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shrivastava, Ankur Kumar, Nitisha Payal, Archit Rastogi, and Amod Tiwari. "Digital Forensic Investigation Development Model." In 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2013. http://dx.doi.org/10.1109/cicn.2013.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Powar, Varsha, Amruta Kulkami, Renuka Lokare, and Aishwarya Lonkar. "Skin detection for forensic investigation." In 2013 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2013. http://dx.doi.org/10.1109/iccci.2013.6466122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anani-Manyo, Nina, and Rui Liu. "Computer Vision and Forensic Investigation." In Ninth Congress on Forensic Engineering. Reston, VA: American Society of Civil Engineers, 2022. http://dx.doi.org/10.1061/9780784484548.061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Halter, Andrew. "Forensic Investigation of a Patio Failure." In Fourth Forensic Engineering Congress. Reston, VA: American Society of Civil Engineers, 2006. http://dx.doi.org/10.1061/40853(217)8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Forensic investigation"

1

Almirall, José, Hal Arkes, John Lentini, Fred Mowrer, and Janusz Pawliszyn. Forensic Science Assessments: A Quality and Gap Analysis - Fire Investigation. American Association for the Advancement of Science, July 2017. http://dx.doi.org/10.1126/srhrl.aag2872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stock, Gregory J. An Investigation of Applications of Neural Style Transfer to Forensic Footwear Comparison. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.gcr.23-040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stock, Gregory. An Investigation of Applications of Neural Style Transfer to Forensic Footwear Comparison. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nic Daeid, Niamh, Heather Doran, Lucina Hackman, and Pauline Mack. The Curse of the Burial Dagger Teacher Materials. University of Dundee, September 2021. http://dx.doi.org/10.20933/100001220.

Full text
Abstract:
The Curse of the Burial Dagger is an interactive graphic novel murder mystery, created by the Leverhulme Research Centre for Forensic Science and digital story studio Fast Familiar. Players use maths, logic and critical reasoning skills to assist Susie uncover different types of forensic evidence and weigh up contrasting hypotheses. Can they uncover the events leading up to Lord Hamilton’s death and deduce how he died…before the curse strikes again? These documents are the Teacher/Group lead pack which contain additional resources including: • The Teacher/Group Lead Pack – Teacher walk through – Factsheet – What is Forensic Science? – Factsheet – What is a hypothesis? – Marzipan Calculation – Factsheet and activity – Fingerprint Analysis – Activity – Chromatography investigation • Printable completion certificate • Printable Note paper and fact-sheet
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Nicole S., Jeri D. Ropero-Miller, Heather Waltke, Danielle McLeod-Henning, Danielle Weiss, and Hannah Barcus. Proceedings of the International Forensic Radiology Research Summit May 10–11, 2016, Amsterdam, The Netherlands. RTI Press, September 2017. http://dx.doi.org/10.3768/rtipress.2017.cp.0005.1709.

Full text
Abstract:
On May 10–11, 2016, the US Department of Justice (DOJ) National Institute of Justice (NIJ), the Netherlands Forensic Institute (NFI; Dutch Ministry of Security and Justice of the Netherlands), the International Society for Forensic Radiology and Imaging (ISFRI), the International Association of Forensic Radiographers (IAFR), and NIJ’s Forensic Technology Center of Excellence (FTCoE) at RTI International organized and convened the International Forensic Radiology Research Summit (IFRRS) at the Academic Medical Center in Amsterdam. The summit assembled 40 international subject matter experts in forensic radiology, to include researchers, practitioners, government employees, and professional staff from 14 countries. The goal of this 2-day summit was to identify gaps, challenges, and research needs to produce a road map to success regarding the state of forensic radiology, including formulating a plan to address the obstacles to implementation of advanced imaging technologies in medicolegal investigations. These proceedings summarize the meeting’s important exchange of technical and operational information, ideas, and solutions for the community and other stakeholders of forensic radiology.
APA, Harvard, Vancouver, ISO, and other styles
6

Hosmer, G., G. Gordon, C. Siedsma, and J. Hosmer. SI-FI (Synthesizing Information from Forensic Investigations). Fort Belvoir, VA: Defense Technical Information Center, February 2002. http://dx.doi.org/10.21236/ada402491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Geist, William H. Briefing on a Simulated Forensics Investigation. Office of Scientific and Technical Information (OSTI), February 2017. http://dx.doi.org/10.2172/1345135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Henzl, Vlad, and Ann Junghans. BioGoo Revolutionizing crime scene investigations with high-efficiency forensic sampling. Office of Scientific and Technical Information (OSTI), July 2022. http://dx.doi.org/10.2172/1879344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Duffy-Turner, M., I. M. Nettleton, M. G. Winter, and I. Webber. Forensic Examination of Critical Special Geotechnical Measures: Soil Nails Information Note. TRL, June 2022. http://dx.doi.org/10.58446/eprl1160.

Full text
Abstract:
The effective design, specification and construction of Special Geotechnical Measures (SGMs) is critical to the efficient operation of the National Highways Strategic Road Network (SRN). Given the required performance of the SRN in terms of resilience, reliability, redundancy and recovery it is essential that SGMs are themselves reliable in terms of performance and life; resilient to external conditions such as earthworks deterioration and extraordinary conditions (e.g. climate change). Around 100 different types of SGMs are used on the SRN and the early installations of some SGMs are approaching the end of their design life and the design, specification and application of many of these techniques is based on limited studies. This Information Note on Soil Nails is part of a series that reports on investigations of specific SGMs and makes recommendations on their future use
APA, Harvard, Vancouver, ISO, and other styles
10

Shields, Ashley, Sara Isbill, Jennifer Niedziela, Andrew Miskowiec, and Erik Nykwest. Informing Forensics Investigations of Nuclear Materials (ALCC 2021-2022 Quarterly Report). Office of Scientific and Technical Information (OSTI), October 2021. http://dx.doi.org/10.2172/1823322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography