Sciweavers

7596 search results - page 3 / 1520
» Challenges in forensic computing
Sort
View
IJDE
2002
145views more  IJDE 2002»
14 years 9 months ago
Cyber Forensics: A Military Operations Perspective
This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities n...
Joseph Giordano, Chester Maciag
SADFE
2007
IEEE
15 years 3 months ago
The Rules of Time on NTFS File System
—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...
AUSFORENSICS
2004
14 years 11 months ago
Towards Identifying Criteria for the Evidential Weight of System Event Logs
Despite the widespread use of computing in almost all functions of contemporary society and the consequently large number of forensic investigations where computing has been invol...
A. Ahmad, Anthonie B. Ruighaver
HICSS
2007
IEEE
138views Biometrics» more  HICSS 2007»
15 years 3 months ago
Online Education in Computer and Digital Forensics: A Case Study
Computer forensics is a relatively new, but growing, field of study at the undergraduate college and university level. This paper describes some of the course design aspects of te...
Gary C. Kessler
ISSA
2004
14 years 11 months ago
An Investigation Into Computer Forensic Tools
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of ...
K. K. Arthur