Sciweavers

JDFP
2006
139views more  JDFP 2006»
13 years 4 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
IJNSEC
2008
210views more  IJNSEC 2008»
13 years 4 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
DI
2006
50views more  DI 2006»
13 years 4 months ago
Improving evidence acquisition from live network sources
The pervasiveness of network technology is causing a shift in the location of digital evidence. What was once largely found on individual disks tied to single individuals is now b...
Bruce J. Nikkel
ISSA
2008
13 years 5 months ago
The Use of File Timestamps in Digital Forensics
Digital evidence is not well perceived by the human senses. Crucial pieces of digital evidence may simply be missed by investigators as the forensic significance of seemingly unim...
Renico Koen, Martin S. Olivier
COMPSAC
2009
IEEE
13 years 11 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data fulï¬...
Rafael Accorsi