Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Standardizing digital evidence storage

Published: 01 February 2006 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2024)Overview of Challenges Faced by Digital Forensic2024 2nd International Conference on Cyber Resilience (ICCR)10.1109/ICCR61006.2024.10532850(1-8)Online publication date: 26-Feb-2024
  • (2016)Information gems from criminal minesTransforming Government: People, Process and Policy10.1108/TG-03-2015-001610:2(297-314)Online publication date: 16-May-2016
  • (2015)Efficient SSD Integrity Verification Program Based on Combinatorial Group TheoryInternational Journal of Interdisciplinary Telecommunications and Networking10.4018/ijitn.20150101067:1(72-79)Online publication date: 1-Jan-2015
  • Show More Cited By

Index Terms

  1. Standardizing digital evidence storage

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 49, Issue 2
    Next-generation cyber forensics
    February 2006
    127 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/1113034
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 February 2006
    Published in CACM Volume 49, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)123
    • Downloads (Last 6 weeks)17
    Reflects downloads up to 21 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Overview of Challenges Faced by Digital Forensic2024 2nd International Conference on Cyber Resilience (ICCR)10.1109/ICCR61006.2024.10532850(1-8)Online publication date: 26-Feb-2024
    • (2016)Information gems from criminal minesTransforming Government: People, Process and Policy10.1108/TG-03-2015-001610:2(297-314)Online publication date: 16-May-2016
    • (2015)Efficient SSD Integrity Verification Program Based on Combinatorial Group TheoryInternational Journal of Interdisciplinary Telecommunications and Networking10.4018/ijitn.20150101067:1(72-79)Online publication date: 1-Jan-2015
    • (2014)Digital Evidence Bag Selection for P2P Network InvestigationFuture Information Technology10.1007/978-3-642-40861-8_44(307-314)Online publication date: 2014
    • (2013)LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcementWorld Congress on Internet Security (WorldCIS-2013)10.1109/WorldCIS.2013.6751038(156-161)Online publication date: Dec-2013
    • (2012)Dilemmas in Digital Forensics for Computer Equipment Security and Maintenance in Remote ShipsAdvanced Materials Research10.4028/www.scientific.net/AMR.490-495.1382490-495(1382-1386)Online publication date: Mar-2012
    • (2012)Digital forensic research: current state of the artCSI Transactions on ICT10.1007/s40012-012-0008-71:1(91-114)Online publication date: 13-Nov-2012
    • (2011)Storage and exchange formats for digital evidenceDigital Investigation10.1016/j.diin.2011.09.0028:2(122-128)Online publication date: Nov-2011
    • (2011)Defining a Standard for Reporting Digital Evidence Items in Computer Forensic ToolsDigital Forensics and Cyber Crime10.1007/978-3-642-19513-6_7(78-95)Online publication date: 2011
    • (2009)Weaving ontologies to support digital forensic analysisProceedings of the 2009 IEEE international conference on Intelligence and security informatics10.5555/1706428.1706470(203-205)Online publication date: 8-Jun-2009
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Magazine Site

    View this article on the magazine site (external)

    Magazine Site

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media