Sciweavers

15 search results - page 1 / 3
» ijde 2006
Sort
View
IJDE
2002
82views more  IJDE 2002»
13 years 4 months ago
Practical Approaches to Recovering Encrypted Digital Evidence
As more criminals use encryption to conceal incriminating evidence, forensic examiners require practical methods for recovering some or all of the encrypted data. This paper prese...
Eoghan Casey
IJDE
2002
145views more  IJDE 2002»
13 years 4 months ago
Cyber Forensics: A Military Operations Perspective
This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities n...
Joseph Giordano, Chester Maciag
IJDE
2007
77views more  IJDE 2007»
13 years 4 months ago
Session Based Packet Marking and Auditing for Network Forensics
The widely acknowledged problem of reliably identifying the origin of network data has been the subject of many research works. Due to the nature of Internet Protocol, a source IP...
Omer Demir, Ping Ji, Jinwoo Kim
IJDE
2007
384views more  IJDE 2007»
13 years 4 months ago
Computer Forensic Analysis in a Virtual Environment
In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and softwa...
Derek Bem, Ewa Huebner
IJDE
2007
105views more  IJDE 2007»
13 years 4 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka