Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online transactions, and also negatively by criminals... more
    • by 
    •   6  
      Forensic PsychologyForensicsComputer ForensicsForensic Science
    • by 
    •   6  
      Forensic PsychologyForensicsComputer ForensicsForensic Science
ABSTRACT During the last decade, smartphones have shown increased computational and networking capabilities. With the high bandwidth supported by Fourth Generation/ Long-Term Evolution (4G/LTE) technology, end-users will enjoy improved... more
    • by 
    •   8  
      Computer ScienceInformation TechnologyInformation SecurityInformation
This document contain a simple example of an expert witness digital forensics report
    • by 
    •   24  
      Critical TheoryCriminologyCriminal LawCriminal Justice
ÖZET Bu araştırmada, olaya müdahale eden, güvenlik denetçilerini, proaktif güvenlik izleyicilerini ve adli araştırmacıları ilgilendiren birçok veri setini sürekli olarak toplamak üzere Android akıllı telefonlar için kurumsal bir prototip... more
    • by 
    •   3  
      Computer ForensicsMobile ForensicsAdli Bilişim
With the continued growth of smart phone market, the probability of their use in criminal activities has continued to increase. Mobile phone nowadays comes with a wide variety of software application, new technologies and operating... more
    • by 
    •   3  
      Digital ForensicsComputer ApplicationsMobile Forensics
    • by 
    •   2  
      Digital ForensicsMobile Forensics
The computer is being used by majority of the people living today. There are linked to the computer either directly or indirectly. The computer systems are gaining their implementations in different departments. Either it is education or... more
    • by 
    •   11  
      Computer ForensicsDigital ForensicsDigital Investigation,Computer Forensics, Computer securityCyber Forensics
Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naiknya potensi tindakan kriminal dilakukan melalui aplikasi IM. Fitur keamanan data aplikasi IM yang ditujukan untuk melindungi privasi... more
    • by  and +1
    •   3  
      Digital Forensic, Cyber Crime, Cyber SecurityMobile ForensicsInternet of Things (IoTs)
This thesis provides an overview of files and directories created by popular social media applications. Two popular smartphones with six most used social media mobile applications were taken into consideration. Mobile applications were... more
    • by 
    •   4  
      Information SecuritySocial MediaDigital ForensicsMobile Forensics
Aplikasi instant messaging khususnya yang terdapat layanan berbasis web, sangat memungkinkan untuk dijadikan sasaran oleh para pelaku tindak kejahatan digital atau cybercrime. Vulnerabilitas dari aplikasi instant messaging berbasis web... more
    • by 
    • Mobile Forensics
The purpose of this study is to explore the evolving technology and systems to find a low cost, efficient and portable solution for hard disk drive forensic imaging.Hard Disk Drive Imaging is one of the most frequently used forensic... more
    • by 
    •   34  
      Computer SciencePolice ScienceForensicsCyberlaw
Smart phones are one of the most troublesome technologies that exist today and steadily gaining popularity with better connectivity, functionality and productivity. The ever-increasing complexity of these smart phones gives a new level of... more
    • by 
    •   5  
      Information SecurityComputer ForensicsAndroidDigital Forensics
    • by 
    •   7  
      Computer ForensicsAndroidDigital ForensicsDigital Investigation,Computer Forensics, Computer security
Many teachers and students in Nigerian institutions of learning find teaching and learning a herculean task and very boring because of the obsolete methods of teaching and learning in this sector of the Nigerian economy. New innovative... more
    • by 
    •   123  
      Information SystemsComputer ScienceFault Tolerant ComputingSoftware Engineering
The proliferation of smartphones introduces new opportunities in digital forensics. One of the reasons is that smartphones are usually equipped with sensors (e.g. accelerometer, proximity sensor, etc.), hardware which can be used to infer... more
    • by  and +1
    • Mobile Forensics
Çeviri: Özgür Koca, ensei@tankado.com, v1.0 Özet Cep telefonları, özellikle de akıllı telefonlar hayatımızda önemli bir rol oynamaktadır. Mobil cihaz pazarının muazzam büyümesiyle, onları suç faaliyetinde kullanma imkânı da sürekli... more
    • by 
    •   2  
      Mobile ForensicsAdli Bilişim
The use of Information and Communication Technologies (ICT) in administrative and governmental bodies to improve the information and services offered to citizens, to guide the effectiveness and efficiency of public management, and to... more
    • by  and +2
    •   2  
      Mobile TechnologyMobile Forensics
In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online transactions, and also negatively by criminals... more
    • by  and +1
    •   6  
      Forensic PsychologyForensicsComputer ForensicsForensic Science
    • by  and +2
    •   2  
      Critical infrastructure protectionMobile Forensics
Özet Android 6'nın piyasaya sürüldüğü şu zamanlarda pazardaki iOS payı artmış olsa da, akıllı telefon pazarında, Android hakim işletim sistemi olmaya devam ediyor. Piyasaya sürülen çeşitli Android akıllı telefonlar için veri toplama ve... more
    • by 
    •   2  
      Mobile ForensicsAdli Bilişim
The extraordinary development of mobile communications is a source of new security challenges. Today, mobile phones have become ubiquitous in nature involving their use in many daily activities, and sometimes those activities might be... more
    • by 
    •   14  
      Computer ForensicsForensic ScienceMobile TechnologyDigital Preservation
Crime Scene is a place where the crime has occurred. Crime scene recording is a crucial part of the investigation and reconstruction of an incident. An Investigation Officer usually records the crime scene with the aid of photography,... more
    • by 
    •   3  
      Mobile appsMobile ForensicsMobile Device Forensics
Wearables are an increasingly big item in mobile forensics, in large part due to the ever increasing popularity of social media. A device that falls into this category is Google Glass. A big part of the Google Glass interface is dedicated... more
    • by 
    •   5  
      GlassGoogleAndroidMobile Forensics
Çeviren: Özgür KOCA, (ozgur.koca@linux.org.tr / www.tankado.com), Özet Bu çalışmada Android işletim sisteminin RAM adı verilen geçici/uçucu belleğinde yer alan çeşitli Android uygulamalarına ait kimlik doğrulama verilerinin elde... more
    • by 
    • Mobile Forensics
The rapid rate of technology advancement cannot be left unnoticed especially when it comes to the ICT sector. Ironically, this has also brought about an increase in cybercrime worldwide, thus forensic agencies and analysts are constantly... more
    • by 
    •   4  
      Computer ForensicsDigital ForensicsCyber SecurityMobile Forensics
My interview with Times of India about Mobile Forensics.
    • by 
    •   7  
      Computer ForensicsMobile TechnologyMobile ComputingDigital Forensics
Forensic Medicine Education is going to play a great role in any civilized democratic government. The efficient criminal justice delivery system cannot function without quality of investigations based on quality of Forensic Medicine... more
    • by 
    •   3  
      Forensic ScienceForensic Medicine & clinical ToxicologyMobile Forensics
During the last decade, smartphones have shown increased computational and networking capabilities. With the high bandwidth supported by Fourth Generation/ Long-Term Evolution (4G/LTE) technology, end-users will enjoy improved quality of... more
    • by 
    •   7  
      Computer ScienceInformation TechnologyInformation SecurityLive Forensics
Daily, hundreds of millions of people use their phones in their everyday lives, and many of them become victims of a variety of illicit activities.With the ongoing expansion of the smart phone market, the likelihood of their usage in... more
    • by 
    •   2  
      Mobile ForensicsMobile Device Forensics
Growing use of mobile handheld devices, such as cell phones and PDA does provide productivity benefits but they also pose new security risks. Due to continued growth of processing power and ever evolving ubiquitous functionality of... more
    • by 
    •   6  
      Computer ForensicsMobile TechnologyCryptographyMobile Computing
Completing our field season at Olduvai, where our team deployed forensic cleanroom methods to excavate early hominin tools at Bed I and II. Pervasive contamination in field and laboratory settings for residue analysis, especially starch... more
    • by  and +3
    •   9  
      EthnobotanyPalaeolithic ArchaeologyPhytolith AnalysisLithic Technology
Računovodsko-finančno poslovanje zajema velike količine različnih digitalnih dokumentov, ki bodo obravnavani v tej nalogi. Pozornost bo namenjena potencialnim skritim podatkom (metapodatki), ki jih ti dokumenti nosijo in možna tveganja,... more
    • by 
    •   32  
      Computer ScienceInformation TechnologyComputer ForensicsForensic Science
In the 21st century, technology is increasing rapidly, the increase in technology is the potential for cyber attacks on today's technological infrastructure. Malware that is designed to damage computer systems without the owner's... more
    • by 
    •   2  
      Computer ScienceMobile Forensics
    • by 
    • Mobile Forensics
The ActiveSync protocol’s implementation on some embedded devices leaves clients vulnerable to unauthorised remote policy enforcement. This paper discusses a proof of concept attack against the implementation of ActiveSync in common Smart... more
    • by 
    •   5  
      Information SecurityAndroidDigital ForensicsCyber Security
From student to business worker, the popularity and ubiquity of mobile devices is exploding. As these devices saturate modern culture, they continue to grow in functionality. Acquiring information from a mobile phone is now an important... more
    • by 
    •   3  
      Computer ForensicsDigital ForensicsMobile Forensics
... This approach could represent a breakthrough in the mobile forensics, since the developed tool could replace the plethora of the hardware tools currently used. ... [9]. McCarthy P., Slay J., 2006.Mobile Phones: admissibility of... more
    • by 
    •   9  
      ForensicsMobile ComputingFile SystemsMobile Device
Ucapan suara memiliki informasi penting yang dapat diterima oleh otak melalui gelombang suara. Otak menerima gelombang suara melalui alat pendengaran dan menghasilkan suatu informasi berupa pesan, bahasa, dan emosi. Pengenalan emosi... more
    • by 
    •   2  
      PhysicsMobile Forensics
    • by 
    •   4  
      Cell Phone ForensicsMobile phoneMobile ForensicsData Gathering
Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naiknya potensi tindakan kriminal dilakukan melalui aplikasi IM. Fitur keamanan data aplikasi IM yang ditujukan untuk melindungi privasi... more
    • by 
    •   5  
      Computer ScienceInstantMobile ForensicsSinkron
Faculty of Engineering, Department of Computer Science, Systems and Production, University of Rome Tor Vergata, 00133 Rome, Italy E-mail: rosamariaberte@libero.it E-mail: dellutri@disp.uniroma2.it E-mail: grillo@disp.uniroma2.it E-mail:... more
    • by 
    •   5  
      Computer ScienceDigital ForensicsCrime ScenesMobile Devices
With the continued growth of smart phone market, the probability of their use in criminal activities has continued to increase. Mobile phone nowadays comes with a wide variety of software application, new technologies and operating... more
    • by 
    •   3  
      Digital ForensicsComputer ApplicationsMobile Forensics
Scholars are requested to send their papers for peer-review and publication in the Journal, Forensic Science Today.
    • by 
    •   7  
      Forensic PsychologyForensic AnthropologyComputer ForensicsForensic Science
In today's complex crime scenes, it is very important to approach the digital crime scene with a holistic approach. The holistic approach includes using all domains within forensic investigations. The holistic approach allows the... more
    • by 
    •   7  
      Computer ForensicsForensic ScienceBiologyInvestigation
    • by 
    •   4  
      Cell Phone ForensicsMobile phoneMobile ForensicsData Gathering
There is a growing demand for cloud storage services such as Dropbox, Box, Syncplicity and SugarSync. These public cloud storage services can store gigabytes of corporate and personal data in remote data centres around the... more
    • by  and +1
    •   6  
      Information SecurityComputer ForensicsDigital ForensicsMobile Devices
Bukti GPS menjadi penting untuk keberhasilan banyak penuntutan misalnya dalam aktivitas teroris, teroris menggunakan smartphone untuk bertukar dan menyimpan informasi. Oleh sebab itu dibutuhkan penanganan khusus untuk melakukan... more
    • by 
    •   5  
      AndroidDigital ForensicsMobile ForensicsDigital Evidence