Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online transactions, and also negatively by criminals... more
    • by 
    •   6  
      Forensic PsychologyForensicsComputer ForensicsForensic Science
Today's huge volumes of data, heterogeneous information and communication technologies, and borderless cyberinfrastructures create new challenges for security experts and law enforcement agencies investigating cybercrimes. The future of... more
    • by  and +1
    •   4  
      Computer ForensicsSteganographyDigital ForensicsCyber Security
    • by 
    •   5  
      Operating SystemsComputer ForensicsOPERATING SYSTEMDigital Forensics
Crimes committed within electronic or digital domains, particularly within cyberspace, have become extremely common these days. Criminals are using technology to a great extent in committing various digital offences and creating new... more
    • by 
    •   6  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer securityDigital Forensic, Cyber Crime, Cyber SecurityE-discovery
"iPredator - Dark Side of Cyberspace Concept" (Edited & Revised 2019) is the updated version to Dr. Nuccitelli's original 2010 concept. iPredator remains an online assailant concept and explores why some online users become targets.
    • by 
    •   20  
      CriminologyPsychologyForensicsInformation Security
The ISO/IEC 17020 and 17025 standards both include requirements for impartiality and the freedom from bias. Meeting these requirements for implicit cognitive bias is not a simple matter. In this article, we address these international... more
    • by  and +1
    •   10  
      ForensicsForensic AnthropologyForensic ScienceStandards
— Today’s growing number of security threats to computers and networks also increase the importance of log inspections to support the detection of possible breaches. The investigation and assessment of security incidents becomes more and... more
    • by 
    •   20  
      Computer ScienceComputer ForensicsData AnalysisComputer Security
Abstract—Forensic analysis of a suspect program is a daily challenge encounters forensic analysts and law-enforcement. It requires determining the behavior of a suspect program found in a computer system subject to investigation and... more
    • by 
    •   8  
      SemanticsProgram AnalysisDigital ForensicsForensic Analysis
    • by 
    •   5  
      CybercrimesMalwareDigital ForensicsZeus
German physicist Georg Christoph Lichtenberg once said, “The most dangerous of all falsehoods is a slightly distorted truth.” In our multimedia–driven society, where photographic and video evidence enjoys an epistemologically unique... more
    • by 
    •   9  
      Digital InvestigationEvidenceForgery, Fakery, FraudDigital Forensics
Dengan lebih dari 1000 juta pengguna aktif berdasarkan survey 2017 perkembangan ini semakin meningkat setiap tahunnya [1]. Perlu diketahui bahwa WhatsApp mempunyai suatu tabel database yang tersimpan secara rasahsia didalam sistem sistem... more
    • by 
    •   4  
      Computer ScienceAndroidDigital ForensicsWhatsapp
In this paper, an experimental evaluation of one of the most effective source camera identification techniques proposed so far, by Lukáš et al., is presented. This method uses the characteristic noise left by the sensor on a digital... more
    • by 
    •   6  
      Online social networksDigital ForensicsDigital Image ForensicDigital Image Processing and Image Forensics
    • by 
    •   6  
      Forensic PsychologyForensicsComputer ForensicsForensic Science
Background: Sexual assault examiners provides comprehensive health care to victims of sexual assault. Communication with the victim is important to collect relevant information from the victims. Ineffective communications can cause... more
    • by  and +2
    •   16  
      NursingForensic ScienceMental Health nursingForensic Medicine
    • by 
    •   5  
      Information TechnologyReferenceGovernanceDigital Forensics
Malware is a pervasive problem in both personal computing devices and distributed computing systems. Identification of malware variants and their families others a great benefit in early detection resulting in a reduction of the analyses... more
    • by  and +1
    •   3  
      Computer ForensicsMalware AnalysisDigital Forensics
— An automatic verification of person's identity from its voice is a part of modern telecommunication services. In order to execute a verification task, a speech signal has to be transmitted to a remote server. So, a performance of the... more
    • by 
    •   32  
      Telecommunications EngineeringComputer ScienceHuman Computer InteractionForensics
The success of any statistical steganalysis algorithm depends on the choice of features extracted and the classifier employed. This paper proposes steganalysis using random forests (SURF) employing HCS (Huffman Code Statistics) features... more
    • by 
    •   3  
      Data MiningDigital ForensicsImage Steganalysis
Substantial progress has been achieved in voice-based biometrics in recent times but a variety of challenges still remain for speech research community. One such obstacle is reliable speaker authentication from speech signals degraded by... more
    • by 
    •   20  
      Computer ScienceHuman Computer InteractionForensicsComputer Forensics
The development of systems capable of recognizing and categorising emotions is of interest to researchers in various scientific areas including artificial intelligence. The traditional notion that emotions and rationality are two separate... more
    • by  and +1
    •   77  
      Instrumentation EngineeringBioinformaticsPhysiologyHuman Physiology
Infringement of an information system or data - case study
    • by 
    •   3  
      Digital ForensicsCybercrimeDigital Evidence
    • by  and +1
    •   5  
      EngineeringComputational ModelingDigital ForensicsFormal Logic
—The field of digital forensic analysis has emerged in the past two decades to counter the digital crimes and investigate the modus operandi of the culprits to secure the computer systems. With the advances in technologies and pervasive... more
    • by 
    • Digital Forensics
Digital forensics is the application of forensic and scientific knowledge to retrieve information legally from any digital device such as computers and smartphones. This legally fetched information is then presented as a piece of evidence... more
    • by 
    •   3  
      Forensic ScienceDigital ForensicsComputer Forensics for Cyberspace Crimes
With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal... more
    • by 
    •   9  
      Computer ScienceForensicsComputer ForensicsNetwork Security
When computer security violations are detected, com-puter forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of finding and preserving useful clues in large networks of... more
    • by 
    •   10  
      Expert SystemsComputer SecurityDigital ForensicsDecision Trees
During forensic examination, analysis of unallocated space of seized storage media is essential to extract the previously deleted or overwritten files when the file system metadata is missing or corrupted. The process of recovering files... more
    • by 
    •   10  
      Digital ForensicsData RecoveryEngineering and Computer ScienceComputer Science And Engineering
Secure communication is a necessity that must be considered in any smart application to guarantee the confidentiality of information. Recently, ZigBee has been utilized in different smart applications such as automatic metering, power... more
    • by 
    •   3  
      Digital ForensicsZigbee NetworksCyber Security
In this paper, we deal with introducing a technique of digital forensics for reconstruction of events or evidences after the commitment of a crime through any of the digital devices. It shows a clear transparency between Computer... more
    • by 
    •   6  
      EngineeringComputer ForensicsDigital ForensicsDigital Forensic Model
If we start from the concept: “Forensic Computer is the science of extracting data so that it can be presented as evidence in a court of law” (Albert J. Marcella, 2007), in the process of extraction is important the recovery, examination... more
    • by 
    •   8  
      Criminal JusticeCyberlawCybercrimesCybersecurity
    • by 
    •   11  
      Computer ScienceDoS AttackNetwork ForensicsDigital Forensics
    • by 
    •   5  
      EngineeringDigital ForensicsImage SensorFalse Positive Rate
    • by  and +1
    •   2  
      Computer SecurityDigital Forensics
We are glad to inform you that the School of Engineering & Technology, Sharda University, Greater Noida is organizing One Week International FDP on "Recent Trends in Cyber Security" through online mode from 26th June -01st July, 2021.... more
    • by 
    •   17  
      Information SecurityNetwork SecurityCyberneticsData Analysis
Berkut adalah form design Berdasarkan temuan pada thesis yang disusun oleh Devi Ratnasari (42 field informasi) maka design form yang relevan untuk mencover 42 field informasi
    • by 
    •   5  
      Digital ForensicsCyber SecurityDigital EvidenceChain of Custody
    • by 
    •   4  
      Statistical AnalysisDigital ForensicsFrequencyExecutables
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally... more
    • by 
    •   6  
      EngineeringExpert SystemsComputer ForensicsDigital Forensics
The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats. Bring Your Own Device (BYOD) as a... more
    • by 
    •   14  
      Computer ScienceInformation SecurityData MiningDatabase Systems
WhatsApp is a medium that everyone can use to interact and to share information effectively and efficiently. However, it can be misused for criminal activities. Analyzing WhatsApp' artifacts is quite challenging as the suspect may... more
    • by 
    •   5  
      Data VisualizationDigital ForensicsArtifactsHistorical Timeline
    • by 
    •   4  
      Artificial IntelligenceFuture InternetDigital ForensicsSocial Network Analysis
This paper discusses the concept of a virtual digital forensic laboratory, which incorporates networked examination and storage machines, secure communications, multi-factor authentication, role-based access control, and case management... more
    • by 
    •   10  
      Digital ForensicsVirtual LaboratoryCase ManagementAsset Management
Similarity digesting is a class of algorithms and technologies that generate hashes from files and preserve file similarity. They find applications in various areas across security industry: malware variant detection, spam filtering,... more
    • by 
    •   9  
      AlgorithmsComputer ForensicsNetwork SecurityMathematical Modelling
I wrote this case study on 28 October 2002 for the book Hacking Exposed, Fourth Edition, published by McGraw-Hill Osborne Media on 25 February 2013. The book contained the first definition, in print, of the term "network security... more
    • by 
    •   5  
      Network SecurityDigital ForensicsIntrusion DetectionCyber Security
    • by 
    •   6  
      BusinessComputer ScienceLawArchival Studies
Cloud Storage is recently as emerging topic in these eras. As the data are increasing, the storage become major issue for the people. There are different kind of Cloud Storage application such as One Drive, Sky Drive, Drop Box and Google... more
    • by 
    •   5  
      Computer ScienceInformation SecurityComputer SecurityDigital Forensics
The study was to examine the importance for the study of computer and cyber forensics in the fight against crime and prevention of crime. Using the security agencies in Ghana namely the Ghana police service and the bureau of national... more
    • by  and +1
    •   9  
      Computer ForensicsComputer EngineeringComputer NetworksComputer Security
Riepilogo delle regole fondamentali

2) Accenni alla ISO27037

3) Evoluzione degli strumenti hardware professionali

4) Evoluzione degli strumenti software professionali

5) Live Forensics e Sniper Forensics

6) Qualche esempio pratico
    • by 
    •   2  
      Computer ForensicsDigital Forensics
    • by 
    •   27  
      Forensic PsychologyDigital InvestigationPrivacyStatistical Analysis
Traffic analysis consists of capturing network traffic in order to identify and respond to anomalies that could be indicative of security threats or other areas of concern. The communication, network, and technological infrastructures... more
    • by 
    •   11  
      Information TechnologyInformation SecurityNetwork AnalysisCybersecurity