Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Electronic Evidence is “data or information of probative value that is stored or transmitted in the binary form”. This is a presentation made before 600 Prosecution officers from across India, it was hosted on BPRD platform and conducted... more
    • by 
    •   15  
      LawCriminal LawInternational LawLaw of evidence
This is the only forensic-qualified tool for examinination of optical media. It has been around since 1999 and is in use by law enforcement, government and data recovery companies worldwide.
    • by 
    •   16  
      Digital Forensic Evidence ProvisionDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer security
Some institutions provide online courses to students to ease the courses' workload. Online courses can also be convenient because the online course content management software conducts marking of tests and examinations. However, a few... more
    • by 
    •   4  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyComputer Forensics, Digital evidence acquisitionDigital Forensic Model
El objetivo principal del presente artículo es proponer una guía metodológica que permita identificar la evidencia digital presente en los volcados de memoria de los sistemas operativos Microsoft Windows y GNU/Linux. Para realizar este... more
    • by 
    •   5  
      Computer ForensicsDigital ForensicsComputer Forensics, Digital evidence acquisitionInformática Forense
computer_Anti-forensics
    • by 
    •   11  
      Computer ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer securityComputer & Cyber forensics
The primary focus of this article entitled ”Electronic and Computer Evidence in Proceedings before Courts and Labour Tribunals” is on evidence emanating from computers and other electronic devices, which account to a major share of... more
    • by 
    •   12  
      Law of evidenceElectronicsLaw and Ethics in Forensic ScienceElectronics and communication
The purpose of this study is to explore the evolving technology and systems to find a low cost, efficient and portable solution for hard disk drive forensic imaging.Hard Disk Drive Imaging is one of the most frequently used forensic... more
    • by 
    •   34  
      Computer SciencePolice ScienceForensicsCyberlaw
Many a times, it has been argued that over dependency on technology leads to deskilling, lack of innovation and creativity thus resulting in inferior or substandard work. With a field growing in both demand for personnel and market for... more
    • by 
    •   10  
      Computer ForensicsDigital ForensicsCyber SecurityCyber Forensics
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient... more
    • by  and +1
    •   25  
      Information SecurityComputer ForensicsVirtual MemoryMalware Analysis
Bellingcat’s Digital Forensics Tools
A List of Open Source Verification and Investigation Tools and Methods
    • by 
    •   9  
      Open Source SoftwareOpen Source and Free Software StudiesDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirty
    • by 
    •   17  
      ForensicsComputer ForensicsE-learningVirtual Environments
LAPORAN PRAKTIKUM DIGITAL FORENSIC TENTANG ANALISIS KASUS NARKOBA
MATA KULIAH DIGITAL FORENSIC
    • by 
    •   6  
      Computer ForensicsForensic ScienceDigital ForensicsComputer Forensics, Digital evidence acquisition
Computer Forensic_Cyber Espionage
    • by 
    •   5  
      Digital Investigation,Computer Forensics, Computer securityComputer Forensics for Cyberspace CrimesComputer Forensics, Digital evidence acquisitionComputer Forensic
Mobile phone devices have become popular among every age and social grouping in every society and are utilised by lots of people for different purposes. As the design of Mobile phones are continually evolving due to advancement in present... more
    • by 
    •   3  
      CybercrimesCyber SecurityComputer Forensics, Digital evidence acquisition
    • by  and +1
    •   4  
      Digital EvidencesComputer Forensics, Digital evidence acquisitionDigital EvidenceDIGITAL EVIDENCE AND INVESTIGATION
Almost all evidence to prove facts in litigation involving the internet will be computer- generated. This is the primarily because technology today only allows for internet usage through computers.
    • by 
    •   12  
      JurisprudenceLaw of evidenceCyber WarfareCyber crime
Forensic research into the data transferred from a hobby grade Unmanned Aerial Vehicle (UAV) commonly referred to as a drone. With drones decreasing in price and the increase in sophistication, leads to an increase in the use of drones... more
    • by 
    •   4  
      Computer ForensicsComputer Forensics for Cyberspace CrimesComputer Forensics, Digital evidence acquisitionDrone Forensics
Özet—Usulüne uygun toplanmış ve analize tabi tutulmuş deliller, suçun aydınlatılmasında soruşturma makamı için temel istihbarat kaynağıdır. Delilin incelenmesi aşamasında kullanılan bilimsel teknikler, doğru yer ve zamanda kullanıldığında... more
    • by 
    •   4  
      Digital Investigation,Computer Forensics, Computer securityOpen Source ToolsComputer Forensics, Digital evidence acquisitionInformation System and Computer Forensic
    • by 
    •   4  
      Digital Forensic Evidence ProvisionComputer Forensics, Digital evidence acquisitionDigital EvidenceDIGITAL EVIDENCE AND INVESTIGATION
International criminal tribunals (ICTs) have found, almost consistently, that unlawfully and/or secretly obtained evidence is admissible. De facto, defendants in international criminal law (ICL) enjoy no privacy-related procedural... more
    • by 
    •   20  
      AlgorithmsArtificial IntelligenceCriminal LawMachine Learning
With the increase in technology over the past 30 years, the digital and computer fields have been booming with new ways to harness data and organize someone’s life. Smart devices have become an everyday convenience for millions... more
    • by 
    •   10  
      Computer ForensicsLaw EnforcementDigital ForensicsDigital Investigation,Computer Forensics, Computer security
The advancement in technology especially the use of mobile devices has revolutionized the way of life in the 21st century. This ranges from the way people socialize to the modes of business that take place today. Consequently, mobile... more
    • by 
    •   3  
      Computer Forensics, Digital evidence acquisitionDigital Forensic ModelMobile-Phone-Forensic-Challenges
    • by 
    •   3  
      Ontology (Computer Science)Computer Forensics, Digital evidence acquisitionDigital Evidence
The proliferation of mobile devices has revolutionized life in the 21 st century ranging from the way people socialize to the modes of doing business. Mobile devices contain substantial amounts of private data that in event of crime or... more
    • by 
    •   4  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyComputer Forensics, Digital evidence acquisitionDigital Forensic Model
Over the years researchers have proposed and developed models for extraction of digital evidence in mobile devices but little has been done on standardization of these models hence leading to inconsistencies in the extraction process used... more
    • by 
    •   3  
      Computer Forensics, Digital evidence acquisitionDigital Forensic ModelDigital Forensics and Cyber Investigation
jelen írás célja bemutatni az igazságügyi szakértői területet lefedő komplex keretrendszer egy elemét, amely a megalapozott szakértői véleményalkotást kívánja elektronikusan támogatni. A kutatások eredményeként kialakított lézerszkenneres... more
    • by 
    •   3  
      Computer ForensicsForensic ScienceComputer Forensics, Digital evidence acquisition
    • by 
    •   36  
      Computer Security And ReliabilityNetwork SecurityComputer SecurityUsable Security (Computer Security)
    • by 
    •   4  
      Computer ForensicsComputer Forensics, Digital evidence acquisitionDigital EvidenceDIGITAL EVIDENCE AND INVESTIGATION
Build a comprehensive Digital Forensic Lab
    • by 
    •   11  
      Digital Records ForensicsDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer security
FORENSIC TOOLS
    • by 
    •   8  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer securityDigital Image Forensic
The evidence appropriately collected and subjected to analysis is basic intelligence source for the investigating authorities to the elucidation of the crime. Scientific techniques used in examining the evidence, are among the main... more
    • by  and +1
    •   3  
      Computer ForensicsDigital ForensicsComputer Forensics, Digital evidence acquisition
    • by 
    • Computer Forensics, Digital evidence acquisition
Companies increasingly recur to digital communications and storage of documents. The change brought by digitalisation to the way in which companies operate creates opportunities but also a number of challenges for competition enforcement.... more
    • by 
    •   6  
      Competition LawCompetition PolicyComputer Forensics, Digital evidence acquisitionAntitrust & Competition Law
The importance of high quality, reliable forensic analysis-an issue that is central to the delivery of justice-has become a topic for marked debate with scientists, specialists and government bodies calling for improved standards and... more
    • by 
    •   3  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer securityComputer Forensics, Digital evidence acquisition
– Acquisition of volatile data for further forensic analysis still represents a challenge to both practitioners and researchers. The current tools used for acquisition of such data are focused exclusively on a way to capture content.... more
    • by  and +1
    •   5  
      Computer ForensicsDigital ForensicsComputer Forensics, Digital evidence acquisitionDigital Evidence
The nature of computer crimes has systematically evolved with the progress of computer technologies. Due to the complexity of forensic investigations, the design of new techniques and tools for speeding up and automating tasks required by... more
    • by  and +1
    •   4  
      Digital ForensicsComputer Forensics, Digital evidence acquisitionDigital EvidenceOVAL language
Gaurav, a petroleum engineer, worked for Green Oil (names have been changed to maintain confidentiality and privacy) and was in possession of highly classified and critical data relating to research carried out by the company. Gaurav... more
    • by 
    •   10  
      Information SecurityComputer ForensicsComputer SecurityDigital Forensics
Digital forensics investigation undergone a great transformation in the past two decades. This is due to technological progress and already quite common use of ICT in society. This article deals with the standardization of the procedures... more
    • by  and +1
    •   4  
      Digital InvestigationCzech RepublicDigital Investigation,Computer Forensics, Computer securityComputer Forensics, Digital evidence acquisition