Sciweavers

30 search results - page 1 / 6
» To Revisit: What is Forensic Computing
Sort
View
AUSFORENSICS
2004
13 years 6 months ago
To Revisit: What is Forensic Computing?
The increase in incidence of criminal, illegal and inappropriate computer behaviour has resulted in organisations forming specialist teams to investigate these behaviours. Academi...
Mathew Hannan
TKDE
2010
159views more  TKDE 2010»
13 years 3 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
13 years 11 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
ICHIT
2009
Springer
13 years 2 months ago
Design and implementation of a live-analysis digital forensic system
As the popularity of the internet continues growing, not only change our life, but also change the way of crime. Number of crime by computer as tools, place or target, cases of su...
Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn
SADFE
2010
IEEE
13 years 2 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen