Sciweavers

15 search results - page 3 / 3
» The Use of File Timestamps in Digital Forensics
Sort
View
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
14 years 2 days ago
Using Graphics Processors for Parallelizing Hash-Based Data Carving
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
IJDE
2007
105views more  IJDE 2007»
13 years 5 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka
IJDE
2006
116views more  IJDE 2006»
13 years 5 months ago
Forensics and SIM Cards: An Overview
Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement...
Fabio Casadei, Antonio Savoldi, Paolo Gubian
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
13 years 9 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
JDFP
2006
139views more  JDFP 2006»
13 years 5 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer