Добірка наукової літератури з теми "Digital forensic tool"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Digital forensic tool".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Digital forensic tool":

1

Cigoj, Primož, and Borka Jerman Blažič. "An Advanced Educational Tool for Digital Forensic Engineering." International Journal of Emerging Technologies in Learning (iJET) 11, no. 03 (March 30, 2016): 15. http://dx.doi.org/10.3991/ijet.v11i03.5294.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper presents a novel approach to education in the area of digital forensics based on a multi-platform cloud-computer infrastructure and an innovative computer based tool. The tool is installed and available through the cloud-based infrastructure of the Dynamic Forensic Education Alliance. Cloud computing provides an efficient mechanism for a wide range of services that offer real-life environments for teaching and training cybersecurity and digital forensics. The cloud-based infrastructure, the virtualized environment and the developed educational tool enable the construction of a dynamic e-learning environment making the training very close to reality and to real-life situations. The paper presents the Dynamic Forensic Digital tool named EduFors and describes the different levels of college and university education where the tool is introduced and used in the training of future investigators of cybercrime events.
2

Nizam, Syafiqah Hanisah Shahrol, Nurul Hidayah Ab Rahman, and Niken Dwi Wahyu Cahyani. "Keyword Indexing And Searching Tool (KIST): A Tool to Assist the Forensics Analysis of WhatsApp Chat." International Journal on Information and Communication Technology (IJoICT) 6, no. 1 (June 20, 2020): 23. http://dx.doi.org/10.21108/ijoict.2020.61.481.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Digital forensics is a field that concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. Most of the forensic analysis software is proprietary, and eventually, specialized analysis software is developed in both the private and public sectors. This paper presents an alternative of forensic analysis tools for digital forensics, which specifically to analyze evidence through keyword indexing and searching. Keyword Indexing and Searching Tool (KIST) is proposed to analyze evidence of interest from WhatsApp chat text files using keyword searching techniques and based on incident types. The tool was developed by adopting the Prototyping model as its methodology. KIST includes modules such as add, edit, remove, display the indexed files, and to add WhatsApp chat text files. Subsequently, the tool is tested using functionality testing and user testing. Functionality testing shows all key functions are working as intended, while users testing indicates the majority of respondents are agree that the tool is able to index and search keyword and display forensic analysis results.
3

Bintang, Rauhulloh Ayatulloh, Rusydi Umar, and Anton Yudhana. "Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST." Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto) 21, no. 2 (November 17, 2020): 125. http://dx.doi.org/10.30595/techno.v21i2.8494.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Social Media is becoming very popular among the public today, and the increasing number of social media use has of course a good or bad impact on the course of human life, for example the bad impact is doing cyberbully or chating on social media. Digital forensics is one of the sciences for how to catch criminals in digital which will be needed in evidence in court. Social media criminals need Smartphones to commit digital cybercrime. This research will raise evidence of digital crimes on the Facebook Lite application using forensics. In this study, the forensic tool that will be used is the MOBILEedit Forensic Pro forensic tools with the help of using methods NIST National Institute Of Standars Techlogogy. NIST has a good workflow for extracting digital forensic data. The research results will be obtained in the form of accounts Id, audio, conversations, and images
4

Riadi, Imam, Sunardi Sunardi, and Sahiruddin Sahiruddin. "Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ)." Jurnal Rekayasa Teknologi Informasi (JURTI) 3, no. 1 (June 28, 2019): 87. http://dx.doi.org/10.30872/jurti.v3i1.2292.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
keberadaan smartphone saat ini dianggap sangat membantu aktifitas manusia dalam melakukan pekerjaan sehari- hari. Berkembangnya fitur-fitur yang ada pada smartphone memudahkan para penggunanya beraktifitas seperti melakukan pekerjaan kantor, bisnis, e-banking, dan untuk berinteraksi dengan pengguna lain di media sosial. Perkembangan smartphone tidak hanya memberikan dampak positif tetapi bisa berdampak negatif ketika perkembangan tersebut dimanfaatkan untuk melakukan tindakan kejahatan. Saat ini terdapat banyak kasus penghapusan barang bukti kejahatan yang dilakukan oleh tersangka untuk mengilangkan bukti kejahatan yang dilakukan oleh seorang pelaku. Hal ini menjadi tantangan bagi forensika teknologi informasi dan penegak hukum melakukan penyelidikan secara forensik terhadap smartphone dari tersangka dalam sebuah kasus kejahatan untuk mendapatkan kembali bukti digital yang akan dijadikan sebagai barang bukti dalam sebuah persidangan. Penelitian ini menggunakan tools MOBILedit Forensic, Wondershare dr. Fone for Android, dan Belkasoft Evidence Center untuk memperoleh bukti digital serta menggunakan metode National Institute of Justice (NIJ) yaitu dengan mengidentifikasi, mengusulkan solusi, melakukan uji solusi yang ditawarkan, mengevaluasi dan melaporkan hasil. Dari hasil pengujian tool forensik yang peneliti gunakan, tool MOBILedit Forensic tidak bisa mengembalikan data yang sudah dihapus, tool Wondershare dr. Fone For Android berhasil mengembalikan data kontak, log panggilan,dan pesan yang sudah dihapus, sementara tool Belkasoft Evidence Center hanya bisa mengembalikan data kontak, dan log panggilan yang sudah dihapus.
5

Karabiyik, Umit, and Tugba Karabiyik. "A Game Theoretic Approach for Digital Forensic Tool Selection †." Mathematics 8, no. 5 (May 12, 2020): 774. http://dx.doi.org/10.3390/math8050774.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Digital forensic investigations are getting harder and more time consuming everyday because of various problems including rapid advances in technology, wide variety of available devices in investigations, and large amount of data to be analyzed. In order to tackle with these issues, digital forensic tools are developed by open-source communities and software companies. These software products are released as a complete toolkit or standalone tools targeting specific tasks. In either case, digital forensic investigators use these tools based on their familiarity because of previous training experiences, available funding from their agencies/businesses, tool’s ease of use, etc. Moreover, using additional tools to verify the findings is a common practice in digital forensic investigations. This is particularly common when the previously selected tools do not generate an expected output. In this paper, we propose a game theoretic approach to the tool selection problem in order to help investigators to make a decision on which digital forensic tool to use. We particularly focused on file carving tool usage when building and analyzing our model because of the available data on these tools. Our results show how important it is to investigate the dynamics of strategy changes between the tools during an investigation to increase the efficiency of the investigation using game theoretic modeling.
6

Riadi, Imam, Anton Yudhana, and Muhamad Caesar Febriansyah Putra. "Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method." Scientific Journal of Informatics 5, no. 2 (November 29, 2018): 235–47. http://dx.doi.org/10.15294/sji.v5i2.16545.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The growth of Android-based smartphone users to access media in communicating using Instagram social media is very fast. Activities are carried out when using Instagram social media in communicating to share information such as sending chat texts and pictures. A large number of Instagram users make this application vulnerable to abuse of Instagram such as pornography crimes from Instagram users. This case can be forensic to get digital evidence in the form of chat text and pictures from Instagram messenger is a feature of Instagram. The investigation in this study uses the National Institute of Standards and Technology (NIST) method which provides several stages of collecting, examining, analyzing, reporting while forensic tools use forensic oxygen and axiom magnets. The results of the recovery and comparison of data result using Oxygen forensics and Axiom Magnets obtained digital evidence in the form of data in the form of images and chat. The data obtained by Magnet Axiom is 100% while forensic oxygen is 84%. These data are the results of the performance of both forensic applications in obtaining digital evidence that has been deleted from the Instagram messenger.
7

Jain, Nilakshi, and Dhananjay R Kalbande. "A Comparative Study based Digital Forensic Tool: Complete Automated Tool." International Journal of Forensic Computer Science 9, no. 1 (December 10, 2014): 22–29. http://dx.doi.org/10.5769/j201401003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Nasrulloh, Imam Mahfudl, Sunardi Sunardi, and Imam Riadi. "Analisis Forensik Solid State Drive (SSD) Menggunakan Framework Rapid Response." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 5 (October 8, 2019): 509. http://dx.doi.org/10.25126/jtiik.2019651516.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p class="Abstrak">Teknologi komputer pada empat tahun terahir ini mengalami perkembangan yang pesat. Bersamaan dengan itu juga berdampak negatif salah satunya adalah berupa kejahatan komputer. Kejahatan komputer akan meninggalkan jejak aktivitas kejahatan, maka perlu dilakukan analisa dengan ilmu dan metode forensik untuk mendapatkan barang bukti. Bagaimana jika terjadi kejahatan komputer pada media penyimpanan komputer berjenis <em>non-volatile memory</em> dan dilakukan secara <em>live</em> forensik<em>.</em> Pada penelitian ini dilakukan proses forensik pada <em>Solid State Drive</em> <em>(SSD)</em> dengan <em>framework</em> <em>Grr Rapid Response</em> pada kasus kehilangan <em>data (lost data)</em> suatu organisasi. Langkah kerja forensik mengimplementasikan dari <em>National Institute of Standards Technology (NIST).</em><em> Framework</em> <em>Grr Rapid Response</em> digunakan untuk memberikan tanggapan terhadap insiden forensik digital yang difokuskan pada lingkungan forensik jarak jauh, <em>f</em><em>ramework</em> ini berbasis arsitektur <em>client server</em>. Hasil penelitian ini menunjukkan langkah kerja forensik <em>NIST</em> dapat diimplementasikan pada proses pengambilan bukti digital dengan metode akuisisi secara <em>live </em>forensik, kemampuan <em>tool</em> forensik pada proses eksaminasi <em>Grr Rapid Response</em> pada <em>Workstation (</em><em>Client Grr)</em> dengan media simpan <em>SSD</em><em>,</em> bukti digital dapat ditemukan dan dikembalikan. Bukti digital yang dapat dikembalikan berupa <em>file</em> dokumen, dan hasil validasi pada bukti digital tersebut memiliki nilai <em>hash</em> yang sama dari dua algoritma validasi bukti digital yang diimplementasikan, MD5 dan SHA-1. Sehingga hasil integritas dari dokumen tersebut menunjukkan bahwa bukti digital tersebut identik.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Abstract"><em>Computer technology in the last four years has experienced rapid development. At the same time, it also has a negative impact, one of which is a computer crime. Computer crime will leave traces of criminal activity, so it is necessary to analyze with forensic science and methods to obtain evidence. What if there is a computer crime on a computer storage medium of a type of non-volatile memory and carried out live forensics In this study a forensic process on Solid State Drive (SSD) was carried out with the Grr Rapid Response framework for lost data in an organization. The forensic work step is implemented from the National Institute of Standards Technology (NIST). The Grr Rapid Response Framework is used to provide responses to incidents of digital forensics focused on remote forensic environments, this framework is based on a client server architecture. The results of this study indicate that NIST's forensic work steps can be implemented in the process of taking digital evidence with live forensic acquisition methods, the ability of forensic tools in the Grr Rapid Response examination process on Workstations (Client Grr) with SSD storage media, digital evidence can be found and returned. Digital evidence that can be returned is a document file, and the results of the validation of digital evidence have the same hash value from the two digital proof validation algorithms implemented, MD5 and SHA-1. So the results of the integrity of the document so that the digital evidence is identical.</em></p><p class="Abstrak"><em><strong><br /></strong></em></p>
9

Thanekar, Sachin Arun, K. Subrahmanyam, and A. B. Bagwan. "A Study on Digital Forensics in Hadoop." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 2 (November 1, 2016): 473. http://dx.doi.org/10.11591/ijeecs.v4.i2.pp473-478.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p>Nowadays we all are surrounded by Big data. The term ‘Big Data’ itself indicates huge volume, high velocity, variety and veracity i.e. uncertainty of data which gave rise to new difficulties and challenges. Hadoop is a framework which can be used for tremendous data storage and faster processing. It is freely available, easy to use and implement. Big data forensic is one of the challenges of big data. For this it is very important to know the internal details of the Hadoop. Different files are generated by Hadoop during its process. Same can be used for forensics. In our paper our focus is on digital forensics and different files generated during different processes. We have given the short description on different files generated in Hadoop. With the help of an open source tool ‘Autopsy’ we demonstrated that how we can perform digital forensics using automated tool and thus big data forensics can be done efficiently.</p>
10

Souvignet, T., and J. Frinken. "Differential Power Analysis as a digital forensic tool." Forensic Science International 230, no. 1-3 (July 2013): 127–36. http://dx.doi.org/10.1016/j.forsciint.2013.03.040.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Digital forensic tool":

1

Hansen, Tone. "A Digital Tool to Improve the Efficiency of IT Forensic Investigations." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40232.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The IT forensic process causing bottlenecks in investigations is an identified issue, with multiple underlying causes – one of the main causes being the lack of expertise among those responsible for ordering IT forensic investigations. The focus of the study is to create and evaluate a potential solution for this problem, aiming to answer research questions related to a suitable architecture, structure and design of a digital tool that would assist individuals in creating IT forensic orders. This work evaluates concepts of such a digital tool. This is done using a grounded theory approach, where a series of test sessions together with the answers from a survey have been examined and analyzed in an iterative process. A low-fidelity prototype is used in the process. The resulting conclusion of the study is a set of concepts, ideas and principles for a digital tool that would aid in the IT forensic ordering process, as well improving the efficiency of the IT forensic process itself. Future work could involve developing the concept further to eventually become a finished product, or using it for improving already existing systems and tools, improving the efficiency and quality of the IT forensic process.
2

Rule, Samantha Elizabeth. "A Framework for using Open Source intelligence as a Digital Forensic Investigative tool." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017937.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The proliferation of the Internet has amplified the use of social networking sites by creating a platform that encourages individuals to share information. As a result there is a wealth of information that is publically and easily accessible. This research explores whether open source intelligence (OSINT), which is freely available, could be used as a digital forensic investigative tool. A survey was created and sent to digital forensic investigators to establish whether they currently use OSINT when performing investigations. The survey results confirm that OSINT is being used by digital forensic investigators when performing investigations but there are currently no guidelines or frameworks available to support the use thereof. Additionally, the survey results showed a belief amongst those surveyed that evidence gleaned from OSINT sources is considered supplementary rather than evidentiary. The findings of this research led to the development of a framework that identifies and recommends key processes to follow when conducting OSINT investigations. The framework can assist digital forensic investigators to follow a structured and rigorous process, which may lead to the unanimous acceptance of information obtained via OSINT sources as evidentiary rather than supplementary in the near future.
3

Liljekvist, Erika, and Oscar Hedlund. "Uncovering Signal : Simplifying Forensic Investigations of the Signal Application." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44835.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The increasing availability of easy-to-use end-to-end encrypted messaging applications has made it possible for more people to conduct their conversations privately. This is something that criminals have taken advantage of and it has proven to make digital forensic investigations more difficult as methods of decrypting the data are needed. In this thesis, data from iOS and Windows devices is extracted and analysed, with focus on the application Signal. Even though other operating systems are compatible with the Signal application, such as Android, it is outside the scope of this thesis. The results of this thesis provide access to data stored in the encrypted application Signalwithout the need for expensive analysis tools. This is done by developing and publishing the first open-source script for decryption and parsing of the Signal database. The script is available for anyone at https://github.com/decryptSignal/decryptSignal.
4

Altiero, Roberto A. "Digital Forensics Tool Interface Visualization." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/24.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recent trends show digital devices utilized with increasing frequency in most crimes committed. Investigating crime involving these devices is labor-intensive for the practitioner applying digital forensics tools that present possible evidence with results displayed in tabular lists for manual review. This research investigates how enhanced digital forensics tool interface visualization techniques can be shown to improve the investigator's cognitive capacities to discover criminal evidence more efficiently. This paper presents visualization graphs and contrasts their properties with the outputs of The Sleuth Kit (TSK) digital forensic program. Exhibited is the textual-based interface proving the effectiveness of enhanced data presentation. Further demonstrated is the potential of the computer interface to present to the digital forensic practitioner an abstract, graphic view of an entire dataset of computer files. Enhanced interface design of digital forensic tools means more rapidly linking suspicious evidence to a perpetrator. Introduced in this study is a mixed methodology of ethnography and cognitive load measures. Ethnographically defined tasks developed from the interviews of digital forensics subject matter experts (SME) shape the context for cognitive measures. Cognitive load testing of digital forensics first-responders utilizing both a textual-based and visualized-based application established a quantitative mean of the mental workload during operation of the applications under test. A t-test correlating the dependent samples' mean tested for the null hypothesis of less than a significant value between the applications' comparative workloads of the operators. Results of the study indicate a significant value, affirming the hypothesis that a visualized application would reduce the cognitive workload of the first-responder analyst. With the supported hypothesis, this work contributes to the body of knowledge by validating a method of measurement and by providing empirical evidence that the use of the visualized digital forensics interface will provide a more efficient performance by the analyst, saving labor costs and compressing time required for the discovery phase of a digital investigation.
5

Shakir, Amer, Muhammad Hammad, and Muhammad Kamran. "Comparative Analysis & Study of Android/iOS MobileForensics Tools." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44797.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This report aims to draw a comparison between two commercial mobile forensics and recovery tools, Magnet AXIOM and MOBILedit. A thorough look at previously done studies was helpful to know what aspects of the data extractions must be compared and which areas are the most important ones to focus upon. This work focuses on how the data extracted from one tool compares with another and provides comprehensive extraction based on different scenarios, circumstances, and aspects. Performances of both tools are compared based on various benchmarks and criteria. This study has helped establish that MOBILedit has been able to outperform Magnet AXIOM on more data extraction and recovery aspects. It is a comparatively better tool to get your hands on.
6

Lundgren, Marcus, and Johan Persson. "Constructing and Evaluating a Raspberry Pi Penetration Testing/Digital Forensics Reconnaissance Tool." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42805.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Tools that automate processes are always sough after across the entire IT field. This project's aim was to build and evaluate a semi-automated reconnaissance tool based on a Raspberry Pi 4, for use in penetration testing and/or digital forensics. The software is written in Python 3 and utilizes Scapy, PyQt5 and the Aircrack-ng suite along with other pre-existing tools. The device is targeted against wireless networks and its main purpose is to capture what is known as the WPA handshake and thereby crack Wi-Fi passwords. Upon achieving this, the program shall then connect to the cracked network, start packet sniffing and perform a host discovery and scan for open ports. The final product underwent three tests and passed them all, except the step involving port scanning - most likely due to hardware and/or operating system faults, since other devices are able to perform these operations. The main functionalities of this device and software are to: identify and assess nearby network access points, perform deauthentication attacks, capture network traffic (including WPA handshakes), crack Wi-Fi passwords, connect to cracked networks and finally to perform host discovery and port scanning. All of these steps shall be executed automatically after selecting the target networks and pressing the start button. Based on the test results it can be stated that this device is well suited for practical use within cyber security and digital forensics. However, due to the Raspberry Pi's limited computing power users may be advised to outsource the cracking process to a more powerful machine, for the purpose of productivity and time efficiency.
7

Bonomi, Mattia. "Facial-based Analysis Tools: Engagement Measurements and Forensics Applications." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/271342.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The last advancements in technology leads to an easy acquisition and spreading of multi-dimensional multimedia content, e.g. videos, which in many cases depict human faces. From such videos, valuable information describing the intrinsic characteristic of the recorded user can be retrieved: the features extracted from the facial patch are relevant descriptors that allow for the measurement of subject's emotional status or the identification of synthetic characters. One of the emerging challenges is the development of contactless approaches based on face analysis aiming at measuring the emotional status of the subject without placing sensors that limit or bias his experience. This raises even more interest in the context of Quality of Experience (QoE) measurement, or the measurement of user emotional status when subjected to a multimedia content, since it allows for retrieving the overall acceptability of the content as perceived by the end user. Measuring the impact of a given content to the user can have many implications from both the content producer and the end-user perspectives. For this reason, we pursue the QoE assessment of a user watching multimedia stimuli, i.e. 3D-movies, through the analysis of his facial features acquired by means of contactless approaches. More specifically, the user's Heart Rate (HR) was retrieved by using computer vision techniques applied to the facial recording of the subject and then analysed in order to compute the level of engagement. We show that the proposed framework is effective for long video sequences, being robust to facial movements and illumination changes. We validate it on a dataset of 64 sequences where users observe 3D movies selected to induce variations in users' emotional status. From one hand understanding the interaction between the user's perception of the content and his cognitive-emotional aspects leads to many opportunities to content producers, which may influence people's emotional statuses according to needs that can be driven by political, social, or business interests. On the other hand, the end-user must be aware of the authenticity of the content being watched: advancements in computer renderings allowed for the spreading of fake subjects in videos. Because of this, as a second challenge we target the identification of CG characters in videos by applying two different approaches. We firstly exploit the idea that fake characters do not present any pulse rate signal, while humans' pulse rate is expressed by a sinusoidal signal. The application of computer vision techniques on a facial video allows for the contactless estimation of the subject's HR, thus leading to the identification of signals that lack of a strong sinusoidality, which represent virtual humans. The proposed pipeline allows for a fully automated discrimination, validated on a dataset consisting of 104 videos. Secondly, we make use of facial spatio-temporal texture dynamics that reveal the artefacts introduced by computer renderings techniques when creating a manipulation, e.g. face swapping, on videos depicting human faces. To do so, we consider multiple temporal video segments on which we estimated multi-dimensional (spatial and temporal) texture features. A binary decision of the joint analysis of such features is applied to strengthen the classification accuracy. This is achieved through the use of Local Derivative Patterns on Three Orthogonal Planes (LDP-TOP). Experimental analyses on state-of-the-art datasets of manipulated videos show the discriminative power of such descriptors in separating real and manipulated sequences and identifying the creation method used. The main finding of this thesis is the relevance of facial features in describing intrinsic characteristics of humans. These can be used to retrieve significant information like the physiological response to multimedia stimuli or the authenticity of the human being itself. The application of the proposed approaches also on benchmark dataset returned good results, thus demonstrating real advancements in this research field. In addition to that, these methods can be extended to different practical application, from the autonomous driving safety checks to the identification of spoofing attacks, from the medical check-ups when doing sports to the users' engagement measurement when watching advertising. Because of this, we encourage further investigations in such direction, in order to improve the robustness of the methods, thus allowing for the application to increasingly challenging scenarios.
8

Andersson, Victor. "Standards and methodologies for evaluating digital forensics tools : Developing and testing a new methodology." Thesis, Högskolan i Halmstad, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37485.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Standards play a big role in a lot of professions and when it comes to most aspects of law enforcement and forensic investigation, it’s no different. Despite that, for some reason, there aren’t any for when it comes to evaluating and choosing forensic tools. The lack of an international standard for evaluating forensic tools has a clear negative impact on the digital forensics community as it lowers the value of tool tests and evaluations and hinders both the reproducibility and verification of their results. Most tool evaluations are performed with custom forensic images and measures metrics that are not scientifically motivated, but rather made up based on the evaluator's personal preferences. By examining current standards and related work done in the field, a new methodology is proposed. It builds on scientific principles and the strengths of existing literature. The methodology is then tested in a practical experiment. The result of the paper is a solid foundation for a new standard to be built upon.
9

Furuseth, Andreas Grytting. "Digital Forensics: Methods and tools for retrieval and analysis of security credentials and hidden data." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9264.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

This master thesis proposes digital forensic methods for retrieval and analysis of steganography during a digital investigation. These proposed methods are examined using scenarios. From the examination of steganography and these cases, it is concluded that the recommended methods can be automated and increase the chances for an investigator to detect steganography.

10

Qaisi, Ahmed Abdulrheem Jerribi. "Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool." Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmitted to particular destinations such as MySQL,Oracle databases or log files. The data is normally dumped to these destinations without a forensic standard structure. When digital evidence is needed, forensic specialists are required to analyse a very large volume of data. Even though forensic tools can be utilised, most of this process has to be done manually, consuming time and resources. In this research, we aim to address this issue by combining several existing tools to archive the original IDS data into a new container (Digital Evidence Bag) that has a structure based upon standard forensic processes. The aim is to develop a method to improve the current IDS database function in a forensic manner. This database will be optimised for future, forensic, analysis. Since evidence validity is always an issue, a secondary aim of this research is to develop a new monitoring scheme. This is to provide the necessary evidence to prove that an attacker had surveyed the network prior to the attack. To achieve this, we will set up a network that will be monitored by multiple IDSs. Open source tools will be used to carry input validation attacks into the network including SQL injection. We will design a new tool to obtain the original data in order to store it within the proposed DEB. This tool will collect the data from several databases of the different IDSs. We will assume that the IDS will not have been compromised.

Книги з теми "Digital forensic tool":

1

Altheide, Cory. Digital forensics with open source tools. Edited by Carvey Harlan A. Burlington, MA: Syngress, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Altheide, Cory. Digital forensics with open source tools. Edited by Carvey Harlan A. Burlington, MA: Syngress, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Spenneberg, Ralf. Intrusion Detection fu r Linux-Server: Mit Open-Source-Tools Angriffe erkennen und analysieren ; mit einer Einfu hrung in die digitale Forensik. Mu nchen/Germany: Markt-und-Technik-Verl., 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Digital Forensics with Open Source Tools. Elsevier, 2011. http://dx.doi.org/10.1016/c2009-0-62460-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Nikkel, Bruce. Practical Forensic Imaging: Securing Digital Evidence with Linux Tools. No Starch Press, Incorporated, 2016.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Nikkel, Bruce. Practical Forensic Imaging: Securing Digital Evidence with Linux Tools. No Starch Press, 2016.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Parasram, Shiva V. N. Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools. Packt Publishing - ebooks Account, 2017.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Digital forensic tool":

1

Fernandez, Eduardo, Juan Pelaez, and Maria Larrondo-Petrie. "Attack Patterns: A New Forensic and Design Tool." In Advances in Digital Forensics III, 345–57. New York, NY: Springer New York, 2007. http://dx.doi.org/10.1007/978-0-387-73742-3_24.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Gentry, Eric, Ryan McIntyre, Michael Soltys, and Frank Lyu. "SEAKER: A Tool for Fast Digital Forensic Triage." In Lecture Notes in Networks and Systems, 1227–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_87.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ernsberger, Dominik, R. Adeyemi Ikuesan, S. Hein Venter, and Alf Zugenmaier. "A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 64–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73697-6_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Chopade, Rupali, and Vinod Pachghare. "Evaluation of Digital Forensic Tools in MongoDB Database Forensics." In Advances in Intelligent Systems and Computing, 427–39. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6584-7_40.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lovanshi, Mayank, and Pratosh Bansal. "Benchmarking of Digital Forensic Tools." In New Trends in Computational Vision and Bio-inspired Computing, 939–47. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41862-5_95.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Popescu, Alin C., and Hany Farid. "Statistical Tools for Digital Forensics." In Information Hiding, 128–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30114-1_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kävrestad, Joakim. "Memory Analysis Tools." In Fundamentals of Digital Forensics, 217–24. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Lovanshi, Mayank, and Pratosh Bansal. "Comparative Study of Digital Forensic Tools." In Data, Engineering and Applications, 195–204. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6351-1_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Okolica, James, and Gilbert Peterson. "A Compiled Memory Analysis Tool." In Advances in Digital Forensics VI, 195–204. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15506-2_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mishra, Anand Kumar, Mahesh Govil, and Emmanuel Pilli. "A Taxonomy of Hypervisor Forensic Tools." In Advances in Digital Forensics XVI, 181–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-56223-6_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Digital forensic tool":

1

Reeva, Patel, Dhuri Siddhesh, Gada Preet, Shah Pratik, and Nilakshi Jain. "Digital Forensics Capability Analyzer: A tool to check forensic capability." In 2019 International Conference on Nascent Technologies in Engineering (ICNTE). IEEE, 2019. http://dx.doi.org/10.1109/icnte44896.2019.8945960.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ae Chun, Soon, and Francisco Artigas. "Tide gate sensor network as a forensic tool." In dg.o 2013: 14th Annual International Conference on Digital Government Research. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2479724.2479771.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Alsagoff, Capt Syed Nasir. "Microsoft Excel as a tool for digital forensic accounting." In 2010 International Conference on Information Retrieval and Knowledge Management (CAMP 2010). IEEE, 2010. http://dx.doi.org/10.1109/infrkm.2010.5466938.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mohite, Monali P., and S. B. Ardhapurkar. "Overcast: Developing Digital Forensic tool in cloud computing environment." In 2015 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS). IEEE, 2015. http://dx.doi.org/10.1109/iciiecs.2015.7193220.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Siddiqui, Ali, Oguntoyinbo Olufunmilayo, Hardik Gohel, and Bishwajeet Pandey. "Digital Healthcare System Vulnerability Analysis using Network Forensic Tool." In 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2021. http://dx.doi.org/10.1109/csnt51715.2021.9509647.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mohite, Monali P., Jyoti Y. Deshmukh, and Pallavi R. Gulve. "Qualitative and quantitative analysis of cloud based digital forensic tool." In 2016 10th International Conference on Intelligent Systems and Control (ISCO). IEEE, 2016. http://dx.doi.org/10.1109/isco.2016.7727074.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Rodriguez, Ricardo J., Miguel Martin-Perez, and Inaki Abadia. "A tool to compute approximation matching between windows processes." In 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, 2018. http://dx.doi.org/10.1109/isdfs.2018.8355372.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yannikos, York, and Chistian Winter. "Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing." In 2013 Eighth International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. http://dx.doi.org/10.1109/ares.2013.65.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Van Staden, F. R., and H. S. Venter. "Adding digital forensic readiness to electronic communication using a security monitoring tool." In 2011 Information Security for South Africa (ISSA). IEEE, 2011. http://dx.doi.org/10.1109/issa.2011.6027537.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Tanner, April, David Dampier, and Jim Thompson. "On developing a conceptual modeling report management tool for digital forensic investigations." In 2012 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2012. http://dx.doi.org/10.1109/ths.2012.6459890.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії