Sciweavers

42 search results - page 2 / 9
» Forensic Engineering
Sort
View
SADFE
2007
IEEE
13 years 11 months ago
The Rules of Time on NTFS File System
—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...
SADFE
2009
IEEE
13 years 11 months ago
Automating Disk Forensic Processing with SleuthKit, XML and Python
We have developed a program called fiwalk which produces detailed XML describing all of the partitions and files on a hard drive or disk image, as well as any extractable metadat...
Simson L. Garfinkel
SADFE
2008
IEEE
13 years 11 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...
DAC
2000
ACM
14 years 6 months ago
Forensic engineering techniques for VLSI CAD tools
The proliferation of the Internet has a ected the business model of almost all semiconductor and VLSI CAD companies that rely on intellectual property (IP) as their main source of...
Darko Kirovski, David T. Liu, Jennifer L. Wong, Mi...
SOCO
2011
Springer
12 years 12 months ago
Special issue on soft computing for digital information forensics
Shiguo Lian, Gregory L. Heileman, Afzel Noore