Sciweavers

173 search results - page 5 / 35
» Computer Forensics in Forensis
Sort
View
JDFP
2008
81views more  JDFP 2008»
15 years 3 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
67
Voted
CACM
2005
66views more  CACM 2005»
15 years 3 months ago
Challenges in forensic computing
Rebecca Mercuri
52
Voted
ISJGP
2000
153views more  ISJGP 2000»
15 years 3 months ago
Building a Business Case for Computer Forensics
Kelly J. Kuchta
139
Voted
SOCO
2011
Springer
14 years 11 months ago
Special issue on soft computing for digital information forensics
Shiguo Lian, Gregory L. Heileman, Afzel Noore
SADFE
2007
IEEE
15 years 10 months ago
The Rules of Time on NTFS File System
—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...