Sciweavers

561 search results - page 6 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
IMF
2007
14 years 11 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
101
Voted
CONEXT
2010
ACM
14 years 7 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
IJDE
2002
159views more  IJDE 2002»
14 years 9 months ago
An Examination of Digital Forensic Models
Law enforcement is in a perpetual race with criminals in the application of digital technologies, and requires the development of tools to systematically search digital devices fo...
Mark Reith, Clint Carr, Gregg H. Gunsch
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
15 years 3 months ago
Is the Open Way a Better Way? Digital Forensics Using Open Source Tools
The subject of digital forensics can be quite challenging. Digital forensics is in its infancy and teaching digital forensics includes the techniques as well as the tools that ass...
Dan Manson, Anna Carlin, Steve Ramos, Alain Gyger,...
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 3 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.