Sciweavers

15 search results - page 2 / 3
» ijde 2006
Sort
View
IJDE
2002
66views more  IJDE 2002»
13 years 4 months ago
A Lessons Learned Repository for Computer Forensics
The Law Enforcement community possesses a large, but informal, community memory with respect to digital forensics. Large, because the experiences of every forensics technician and...
Warren Harrison, George Heuston, Mark Morrissey, D...
IJDE
2006
116views more  IJDE 2006»
13 years 4 months ago
Forensics and SIM Cards: An Overview
Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement...
Fabio Casadei, Antonio Savoldi, Paolo Gubian
IJDE
2006
77views more  IJDE 2006»
13 years 4 months ago
Hidden Disk Areas: HPA and DCO
This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problem...
Mayank R. Gupta, Michael D. Hoeschele, Marcus K. R...
IJDE
2006
101views more  IJDE 2006»
13 years 4 months ago
Google Desktop as a Source of Digital Evidence
This paper discusses the emerging trend of Personal Desktop Searching utilities on desktop computers, and how the information cached and stored with these systems can be retrieved...
Benjamin Turnbull, Barry Blundell, Jill Slay
IJDE
2007
110views more  IJDE 2007»
13 years 4 months ago
iPOD Forensics Update
From student to business worker, the popularity and ubiquity of mobile devices is exploding. As these devices saturate modern culture, they continue to grow in functionality. Such...
Matthew Kiley, Tim Shinbara, Marcus Rogers