Academic literature on the topic 'Software forensic tools'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software forensic tools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software forensic tools"

1

Azra, Parveen, Husain Khan Zishan, and Naseem Ahmad Syed. "Classification and evaluation of digital forensic tools." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 6 (2020): 3096~3106. https://doi.org/10.12928/TELKOMNIKA.v18i6.15295.

Full text
Abstract:
Digital forensic tools (DFTs) are used to detect the authenticity of digital images. Different DFTs have been developed to detect the forgery like (i) forensic focused operating system, (ii) computer forensics, (iii) memory forensics, (iv) mobile device forensics, and (v) software forensics tools (SFTs). These tools are dedicated to detect the forged images depending on the type of the applications. Based on our review, we found that in literature of the DFTs less attention is given to the evaluation and analysis of the forensic tools. Among various DFTs, we choose SFTs because it is concerned with the detection of the forged digital images. Therefore, the purpose of this study is to classify the different DFTs and evaluate the software forensic tools (SFTs) based on the different features which are present in the SFTs. In our work, we evaluate the following five SFTs, i.e., “FotoForensics”, “JPEGsnoop”, “Ghiro”, “Forensically”, and “Izitru”, based on different features so that new research directions can be identified for the development of the SFTs.
APA, Harvard, Vancouver, ISO, and other styles
2

Sutikno, Tole. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 2 (2024): 321. http://dx.doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
<p>Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic Detective, XRY by MSAB, Magnet AXIOM, SPF Pro by SalvationDATA, MOBILedit Forensic Express, and EnCase Forensic employ both physical and logical techniques to retrieve data from mobile devices. These advanced tools offer a structured approach to tackling digital crimes effectively. We compare dependability, speed, compatibility, data recovery accuracy, and reporting. Mobile-network forensics ensures data acquisition, decryption, and analysis success. Conclusions show that Android mobile forensics tools for digital crime investigations are diverse and have different capabilities. Mobile forensics software offers complete solutions, but new data storage and encryption methods require constant development. The continuous evolution of forensic software tools and a comprehensive tool classification system could further enhance digital crime investigation capabilities.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Tole, Sutikno. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology 13, no. 2 (2024): 321–32. https://doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic Detective, XRY by MSAB, Magnet AXIOM, SPF Pro by SalvationDATA, MOBILedit Forensic Express, and EnCase Forensic employ both physical and logical techniques to retrieve data from mobile devices. These advanced tools offer a structured approach to tackling digital crimes effectively. We compare dependability, speed, compatibility, data recovery accuracy, and reporting. Mobile-network forensics ensures data acquisition, decryption, and analysis success. Conclusions show that Android mobile forensics tools for digital crime investigations are diverse and have different capabilities. Mobile forensics software offers complete solutions, but new data storage and encryption methods require constant development. The continuous evolution of forensic software tools and a comprehensive tool classification system could further enhance digital crime investigation capabilities.
APA, Harvard, Vancouver, ISO, and other styles
4

Manjre, Mr Bhushan M., and Dr Krishan Kumar Goyal. "Urge for Novel and Secure Software Framework for Extraction and Decoding of Mobile Artifacts." YMER Digital 20, no. 12 (2021): 589–98. http://dx.doi.org/10.37896/ymer20.12/56.

Full text
Abstract:
Mobile Forensics is now days, increasingly becoming more challenging as it is the field of science that is continuously evolving with respect to the rapidly developing technologies and techniques for the extraction of the mobile data and its decoding. Majority of the crimes are getting committed digitally and especially the criminals are preferring mobile handsets than a laptop or desktop machines, leaving the footprints behind which could be evidence against them. The mobile handsets along with their software applications are getting more advanced and sophisticated mainly due to advances in Cloud computing where clouds are used to store data, Anti-forensics where efforts are made to defeat forensic procedures and Encryption which is used to secure the data during transit. But when compared with the pace of development in mobile hardware and software, the forensic tools and techniques are growing very slowly. Hence the contemporary forensic tools and methodologies are becoming increasingly obsolete and hence urges for the advanced forensic tools, methods which could comply with the need of today’s mobile forensics. Hence, this work presents a detailed survey of the contemporary challenges faced by the forensic experts with the current forensic tools and its methodologies and also the need, scope and opportunities associated with the novel and secure software framework that can address the majority of issues occurring while extraction and decoding of mobile artifacts.
APA, Harvard, Vancouver, ISO, and other styles
5

Gyana, Ranjana Panigrahi, Kanta Barpanda Nalini, and Kumar Sethy Prabira. "Navigating the cyber forensics landscape a review of recent innovations." International Journal of Informatics and Communication Technology 13, no. 1 (2024): 27–33. https://doi.org/10.11591/ijict.v13i1.pp27-33.

Full text
Abstract:
The extensive relevance of digital forensics in today's data-driven environment has been emphasized in this article. The free software and the commercial software community are debatable, despite users and developers often differing views on important topics like software safety and usability. This article primarily uses pre-defined criteria and a platform-oriented approach to examine promising freeware (Magnet Forensics and Sleuth Kit) vs. profitable (ProDiscover and Oxygen Forensic Suite) mobile forensics tools. Under diverse settings, the tools' capacity to develop and analyze forensically sound digital forensic media sources is validated. After erasing data, each media type was tested again after formatting. The study concludes with a comparison matrix that may aid in determining the best-fit option for the investigation's requirements among the tools. The findings indicate the potential for freeware to supplant numerous proprietary applications, as users can opt for freeware instead of incurring costs associated with proprietary software. Furthermore, this perception can be put into practice.
APA, Harvard, Vancouver, ISO, and other styles
6

Fadillah, Muhammad Fadil, and Trihastuti Yuniati. "Perbandingan Hasil Recovery Tools Mobile Forensic Di Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ)." Cyber Security dan Forensik Digital 6, no. 2 (2024): 54–61. http://dx.doi.org/10.14421/csecurity.2023.6.2.4172.

Full text
Abstract:
Penggunaan smartphone di Indonesia mencapai 192,15 juta pengguna aktif pada tahun 2022, menjadikannya pasar terbesar keempat di dunia. Namun, pertumbuhan ini juga berdampak pada meningkatnya tindak kejahatan siber, tercatat sebanyak 8,831 kasus selama tahun tersebut. Penelitian tentang efektivitas alat pemulihan mobile forensic pada smartphone Android dapat menjadi acuan pemilihan alat uji mobile forensic baik untuk kebutuhan penyelidikan maupun akademis. Pada penelitian ini dilakukan pengujian terhadap dua tools mobile forensic, yaitu Andriller yang merupakan aplikasi open source, dan MOBILedit Forensic Express Pro yang merupakan aplikasi berbayar, untuk mengetahui seberapa tingkat recovery yang mampu dilakukan oleh kedua tools tersebut. Penelitian dengan metode National Institute of Justice (NIJ) menemukan bahwa kedua software yang digunakan dapat digunakan untuk analisis mobile forensic tanpa akses root ke smartphone. Hasil pengujian menunjukkan MOBILedit Forensic Express Pro memiliki tingkat pemulihan data yang lebih tinggi (83,33%) dibandingkan dengan Andriller (50%). Dari hasil ini diharapkan dapat membantu dalam memilih alat atau software mobile forensic dalam proses penyelidikan maupun kebutuhan akademis. Kata kunci: digital forensik, mobile forensic, national institute of justice ------------------------------------------------------------------------- The usage of smartphones in Indonesia reached 192.15 million active users in 2022, making it the fourth largest market in the world. However, this growth has also led to an increase in cybercrime, with 8,831 cases reported during that year. A research on the effectiveness of mobile forensic recovery tools on Android smartphones, can be a reference for selecting mobile forensic testing tools for both investigative and academic needs. In this research, two mobile forensic tools were tested, namely Andriller, which is an open source application, and MOBILedit Forensic Express Pro, which is a paid application, to find out what level of recovery these two tools are capable of. Research using the National Institute of Justice (NIJ) method found that the two software used can be used for mobile forensic analysis without root access to a smartphone. The test results indicated that MOBILedit Forensic Express Pro achieved a higher data recovery rate (83.33%) compared to Andriller (50%). These findings are expected to aid in selecting suitable mobile forensic tools for investigative and academic purposes. Keywords: digital forensik, mobile forensic, national institute of justice
APA, Harvard, Vancouver, ISO, and other styles
7

Dwi Syahputri, Rischi, Alexander Anggono, Prasetyono Prasetyono, and Mohamad Djasuli. "Evolution and Research Opportunities of Digital Forensic Tools: A Bibliometric Analysis." CogITo Smart Journal 10, no. 2 (2024): 474–85. https://doi.org/10.31154/cogito.v10i2.675.474-485.

Full text
Abstract:
The use of digital technology has increased rapidly, presenting new challenges such as cybercrime, online fraud and money laundering. To address these threats, digital forensic tools have become crucial in investigating and analyzing electronic evidence to combat increasingly complex digital crimes. Therefore, research and development in the field of digital forensics is crucial to address the growing digital security challenges. This study aims to conduct a bibliometric analysis of digital forensic tools research in the business, management and accounting domains over the past ten years, evaluate the evolution of the research, identify promising research opportunities and provide insights into future directions in the field. Bibliometric analysis was conducted with the help of VOSviewer software on 698 Scopus-indexed articles sourced from ScienceDirect during 2014-2023. Based on the network map analysis, it was found that despite much progress, the field continues to evolve and offers many opportunities for further research and innovation in digital forensic tools related to mobile forensics, memory forensics, anti-forensics, malware analysis, cloud forensics, cybersecurity, machine learning and deep learning, and ethics and privacy in forensic investigations.
APA, Harvard, Vancouver, ISO, and other styles
8

Panigrahi, Gyana Ranjana, Nalini Kanta Barpanda, and Prabira Kumar Sethy. "Navigating the cyber forensics landscape a review of recent innovations." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 1 (2024): 27. http://dx.doi.org/10.11591/ijict.v13i1.pp27-33.

Full text
Abstract:
<p><span>The extensive relevance of digital forensics in today's data-driven environment has been emphasized in this article. The free software and the commercial software community are debatable, despite users and developers often differing views on important topics like software safety and usability. This article primarily uses pre-defined criteria and a platform-oriented approach to examine promising freeware (Magnet Forensics and Sleuth Kit) vs. profitable (ProDiscover and Oxygen Forensic Suite) mobile forensics tools. Under diverse settings, the tools' capacity to develop and analyze forensically sound digital forensic media sources is validated. After erasing data, each media type was tested again after formatting. The study concludes with a comparison matrix that may aid in determining the best-fit option for the investigation's requirements among the tools. The findings indicate the potential for freeware to supplant numerous proprietary applications, as users can opt for freeware instead of incurring costs associated with proprietary software. Furthermore, this perception can be put into practice.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2022): 412. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp412-420.

Full text
Abstract:
Data packet analysis targeting instant messaging (IM) applications has become one of the most mentioned case examples in the digital forensic industry, considering that the forensic engineers can extract valuable information by analysing the data packets used by the IM software. The crucial part of this process is to accomplish a series of research and investigation, in addition to correctly implement the related forensics tools. This paper is intended to use QQ, a popular IM software in China, as an experiment example, in cooperation with various tools from Kali Linux, a digital forensics-oriented Linux distribution, to present the complete process of the data packet analysis operation. The result concludes from the experiment may be able to provide constructive suggestions to other related digital forensics cases.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2023): 412–20. https://doi.org/10.11591/ijeecs.v29.i1.pp412-420.

Full text
Abstract:
Data packet analysis targeting instant messaging (IM) applications has become one of the most mentioned case examples in the digital forensic industry, considering that the forensic engineers can extract valuable information by analysing the data packets used by the IM software. The crucial part of this process is to accomplish a series of research and investigation, in addition to correctly implement the related forensics tools. This paper is intended to use QQ, a popular IM software in China, as an experiment example, in cooperation with various tools from Kali Linux, a digital forensics-oriented Linux distribution, to present the complete process of the data packet analysis operation. The result concludes from the experiment may be able to provide constructive suggestions to other related digital forensics cases.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Software forensic tools"

1

Bengtsson, Johnny. "Forensisk hårddiskkloning och undersökning av hårddiskskrivskydd." Thesis, Linköping University, Department of Science and Technology, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2378.

Full text
Abstract:
<p>Detta examensarbete reder ut arbetsprinciperna för olika typer av hårddiskskrivskydd; hårdvaruskrivskydd, mjukvaruskrivskydd, hybridskrivskydd och bygelskrivskydd. Slutsatsen av utredningen är att endast hårdvaruskrivskydd Detta examensarbete reder ut arbetsprinciperna för olika typer av hårddiskskrivskydd; hårdvaruskrivskydd, mjukvaruskrivskydd, hybridskrivskydd och bygelskrivskydd. Slutsatsen av utredningen är att endast hårdvaruskrivskydd bedöms ha tillräckligt pålitliga skyddsprinciper, vilket motiveras av dess oberoende från både hårdvara och operativsystem. </p><p>Vidare undersöks hårdvaruskrivskyddet Image MASSter(TM) Drive Lock från Intelligent Computer Solutions (ICS). Några egentliga slutsatser gick inte dra av kretskonstruktionen, bortsett från att den är uppbyggd kring en FPGA (Xilinx Spartan-II, XC2S15) med tillhörande PROM (XC17S15APC). </p><p>En egenutvecklad idé till autenticieringsmetod för hårddiskkloner föreslås som ett tillägg till arbetet. Principen bygger på att komplettera hårddiskklonen med unik information om hårddisk såväl kloningsomständigheter, vilka sammanflätas genom XOR-operation av komponenternas hashsummor.Autenticieringsmetoden kan vid sjösättning möjligen öka rättsäkerheten för både utredarna och den som står misstänkt vid en brottsutredning. </p><p>Arbetet är till stora delar utfört vid och på uppdrag av Statens kriminaltekniska laboratorium (SKL) i Linköping.</p>
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Software forensic tools"

1

Altheide, Cory. Digital forensics with open source tools. Edited by Carvey Harlan A. Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

A, Carvey Harlan, ed. Digital forensics with open source tools. Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carvey, Harlan, and Cory Altheide. Digital Forensics with Open Source Tools. Elsevier Science & Technology Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

How to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dalziel, Henry, and Simon Crosby. How to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Burnett, Mark, and Gabriele Giuseppini. Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool. Elsevier Science & Technology Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Software forensic tools"

1

Hummert, Christian, and Georgina Louise Humphries. "Property Lists." In Mobile Forensics – The File Format Handbook. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_6.

Full text
Abstract:
AbstractProperty List files (*.plist) are a widely used data storage format used by Apple software. Most of the system properties are stored in plists, but also, many apps store their configuration in plist-files. The data held within Property is regularly of high evidential value for forensic analysts, so understanding the format is essential for the forensic investigation of Apple mobile devices and computers. Not all of today’s digital forensics tools recover plists properly. Especially for carved or damaged plists, the support is insufficient. So the forensic examiner must understand the principles of this file format. This chapter gives an overview of the plist structure to give the examiner the knowledge to get the most information out of the evidence possible.
APA, Harvard, Vancouver, ISO, and other styles
2

Balogun, Adedayo M., and Tranos Zuva. "Towards the Adoption of Software Engineering Principles for Assessing and Ensuring the Reliability of Digital Forensic Tools." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67618-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Hui, Shiva Azadegan, Wei Yu, Subrata Acharya, and Ali Sistani. "Are We Relying Too Much on Forensics Tools?" In Software Engineering Research,Management and Applications 2011. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-23202-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daubner, Lukas, Sofija Maksović, Raimundas Matulevičius, Barbora Buhnova, and Tomás̆ Sedlác̆ek. "Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design." In Research Challenges in Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59468-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dizdarević, Andrea, Sabina Baraković, and Jasmina Baraković Husić. "Examination of Digital Forensics Software Tools Performance: Open or Not?" In Advanced Technologies, Systems, and Applications IV -Proceedings of the International Symposium on Innovative and Interdisciplinary Applications of Advanced Technologies (IAT 2019). Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24986-1_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gomez, Roberto, Julio Cesar Rojas, and Erika Mata. "VALI: A Visual Correlation Tool Based on Vector Clocks." In Open Source Software for Digital Forensics. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-5803-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Azhar, M. A. Hannan Bin, and German Abadia. "A Forensic Tool to Acquire Radio Signals Using Software Defined Radio." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90019-9_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abdullahi, Zakariyya Hassan, Shailendra Kumar Singh, and Moin Hasan. "Development of Evaluation Protocol for Anti-Forensics Encryption Tool Using Software Reverse Engineering Techniques." In Computer Science Engineering and Emerging Technologies. CRC Press, 2024. http://dx.doi.org/10.1201/9781003405580-107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Statistical tools and software." In Forensic Interpretation of Glass Evidence. CRC Press, 2000. http://dx.doi.org/10.1201/9781420042436.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Batten, Lynn M., and Lei Pan. "Testing Digital Forensic Software Tools Used in Expert Testimony." In Handbook of Research on Computational Forensics, Digital Crime, and Investigation. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-836-9.ch011.

Full text
Abstract:
An expert’s integrity is vital for the success of a legal case in a court of law; and witness experts are very likely to be challenged by many detailed technical questions. To deal with those challenges appropriately, experts need to acquire in-depth knowledge and experience of the tools they work with. This chapter proposes an experimental framework that helps digital forensic experts to compare sets of digital forensic tools of similar functionality based on specific outcomes. The results can be used by an expert witness to justify the choice of tools and experimental settings, calculate the testing cost in advance, and be assured of obtaining results of good quality. Two case studies are provided to demonstrate the use of our framework.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software forensic tools"

1

Höne, Thomas, Knut Kröger, Silas Luttenberger, and Reiner Creutzburg. "iPhone examination with modern forensic software tools." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.921453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

AKBAL, ERHAN, and SENGUL DOGAN. "Software and Hardware Tools used in Digital Forensic Data Analysis." In Fifth International Conference On Advances in Computing, Electronics and Electrical Technology - CEET 2016. Institute of Research Engineers and Doctors, 2016. http://dx.doi.org/10.15224/978-1-63248-087-3-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Afifah, Khoirunnisa, and Riza Satria Perdana. "Development of search on encrypted data tools for privacy preserving in digital forensic." In 2016 International Conference on Data and Software Engineering (ICoDSE). IEEE, 2016. http://dx.doi.org/10.1109/icodse.2016.7936152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kröger, Knut, and Reiner Creutzburg. "A practical overview and comparison of certain commercial forensic software tools for processing large-scale digital investigations." In SPIE Defense, Security, and Sensing, edited by Sos S. Agaian, Sabah A. Jassim, and Eliza Y. Du. SPIE, 2013. http://dx.doi.org/10.1117/12.2017906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cousins, R. Michael, Austin Doezema, Alice Roache, and Mark R. Muszynski. "Cloud-Based GIS Mapping Software as an Evaluation Tool for Condition Assessments." In Ninth Congress on Forensic Engineering. American Society of Civil Engineers, 2022. http://dx.doi.org/10.1061/9780784484548.060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ruiz Flores, Luis Ivan. "ADMS Technology: the Challenges of Modeling to Operating Electrical Systems With Digital Twins." In ASME 2022 Power Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/power2022-86577.

Full text
Abstract:
Abstract In this article, we present the evolution of “off-line analysis”, associated with a single-line diagram, and its analysis in steady state, and transient state, towards an “online analysis” of the electric system model, with an interface for Provide users the ability to analyze with “Real-time technology”. In addition, the benefit of implementing this Real-Time Technology capable of monitoring, operating, managing the electrical network and performing analysis of the electrical system will be shown. In addition, it will show the relationship ADMS has with construction engineering, and what is sought from the design of the “electric model” to achieve the integration of systems. The opportunity to have an integrated and unified electric model in which it can be performed: state estimation and load distribution; monitoring and control; predictive simulation of the type “What would happen if?” Forensic analysis; contingency analysis; historical data and analytical tools; automated operation based on SCADA – Supervisory Control and Data Acquisition, DMS – Demand Management System, EMS – Energy Management System, EMCS – Energy Monitoring and Control System, PMS – Power Management System, SCMS – Substation Control and Monitoring System; and maintenance management of the electrical system. The “Real-time Technology” is reflected by having a true ADMS, advanced distribution management system. The purpose of the article is to guide specialists and operators of electrical distribution systems, as well as dispatchers, planning engineers, reliability analysts and managers, in the implementation of ADMS with the possibility of integrating legacy and third-party software: creating a - digital twin - allowing from modeling to operation.
APA, Harvard, Vancouver, ISO, and other styles
7

Ahluwalia, Rashpal S., and Sriram Govindarajulu. "An internet-based software tool for submitting crime information to forensic laboratories." In Optics East, edited by Bhaskaran Gopalakrishnan. SPIE, 2004. http://dx.doi.org/10.1117/12.573006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lamborn, Lyndon, Ernest Kwok, Steven J. Polasik, and Benjamin Hanna. "PRCI Burst Pressure Model Modernization and Performance." In ASME 2023 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2023. http://dx.doi.org/10.1115/pvp2023-105832.

Full text
Abstract:
Abstract The Pipeline Research Council International (PRCI) contracted development and deployment of a burst pressure prediction fracture mechanics model in 2001, embodied in the CorLAS™ V2.0 software. Since that time, many North American operators have made this model an integral part of their integrity management processes with excellent track records for both effectiveness and efficiency. Even though the PRCI burst model originally targeted pipe body stress corrosion cracking, operators have found the model performs equally well for discrete crack-like features associated with long seam welds, and highly versatile in estimating burst pressures of irregularly shaped crack-likes reported by both in-line inspection tools and field non-destructive evaluations. The question is: can application of the model evolve to address emerging threats and trends? As the pipeline industry transitions away from Charpy V-Notch energy as a low fidelity fracture toughness surrogate, Enbridge has repackaged the PRCI burst model to accept K toughness directly, and referred to as KorLAS herein to denote K input built on legacy CorLAS™ equations and empiricism. KorLAS performance over the tested range of flaw dimensions, pipe steel toughness, wall thicknesses, crack morphology, and crack shape are assessed and compared to test and forensic data. The pipeline industry has emerging technologies which are able to detect, size, and report selective seam weld corrosion (SSWC) features. The predicted burst pressures of SSWC features have historically been difficult to predict. A reasonable and prudent tailored KorLAS input method to assess SSWC fitness for service is presented. KorLAS performance at lower toughness has been difficult to validate or judge due to the scarcity of available test data. Test data now made available to the public allows tentative envelope expansion down to about the 10th percentile toughness observed in North American vintage line pipe. Although cold welds can be problematic to detect, KorLAS performance in assessment of cold welds is evaluated against available test data.
APA, Harvard, Vancouver, ISO, and other styles
9

Fu, Changhong, and Shunxiang Wu. "Research and Design of the Computer Forensic Tool for the P2P Downloading Software." In 2009 Second International Symposium on Knowledge Acquisition and Modeling. IEEE, 2009. http://dx.doi.org/10.1109/kam.2009.205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alper, Burcu, Selma Nazlioglu, and Hürevren Kilic. "ACE-PE: An Automated Code Evaluation Software Tool For Programming Education." In 2023 11th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2023. http://dx.doi.org/10.1109/isdfs58141.2023.10131776.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Software forensic tools"

1

Gavrila, Serban I., and Elizabeth Fong. Forensic software testing support tools :. National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7103a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!