Sciweavers

153 search results - page 2 / 31
» An Examination of Digital Forensic Models
Sort
View
IJDE
2002
82views more  IJDE 2002»
13 years 4 months ago
Practical Approaches to Recovering Encrypted Digital Evidence
As more criminals use encryption to conceal incriminating evidence, forensic examiners require practical methods for recovering some or all of the encrypted data. This paper prese...
Eoghan Casey
JDFP
2008
81views more  JDFP 2008»
13 years 4 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
ICASSP
2008
IEEE
13 years 11 months ago
A pattern classification framework for theoretical analysis of component forensics
Component forensics is an emerging methodology for forensic analysis that aims at estimating the algorithms and parameters in each component of a digital device. This paper propos...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
SADFE
2008
IEEE
13 years 11 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
IMF
2007
13 years 6 months ago
A Common Process Model for Incident Response and Computer Forensics
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Felix C. Freiling, Bastian Schwittay