High performance computer analysis for indexing emails in digital forensic analysis (Computer Forensics)

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Signature analysis and Computer Forensics

Computer Forensics is a process of using scientific knowledge to collect, analyze and present digital evidence to court or tribunals. Since files are the standard persistent form of data on computers, the collection, analysis and presentation of computer files as digital evidence is of utmost essential in Computer Forensics. However, data can be hidden behind files and can be enough to trick th...

متن کامل

Computer Forensic Analysis in a Virtual Environment

In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and software tools are presented and discussed. Further we identify the limitations of virtual environments leading to the conclusion that this method can not be considered to be a replacement for conventional techniques of comp...

متن کامل

Development of masters modules in computer forensics and cybercrime for computer science and forensic science students

In mid-2004, it was decided that the list of optional modules available to students taking the MSc programme in Computing, Internet Law and Management at King’s College London (KCL) should be supplemented with a module in computer forensics (CF) and cybercrime. It was proposed that this module should be delivered as a reading course to be assessed by means of a dissertation and a linked viva vo...

متن کامل

Digital Profiling: A Computer Forensics Approach

Nowadays investigations have become more difficult than in the past. It is already clear that, in modern crime scene, a vast amount of evidence are in the electronic or digital form and that the computer system or network have a paramount role in researching of indicators and evidence. The correct analysis of log file and the data saved in the system memory, in this new scenario, are crucial fo...

متن کامل

A second generation computer forensic analysis system

The architecture of existing – first generation – computer forensic tools, including the widely used EnCase and FTK products, is rapidly becoming outdated. Tools are not keeping pace with increased complexity and data volumes of modern investigations. This paper discuses the limitations of first generation computer forensic tools. Several metrics for measuring the efficacy and performance of co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Trends in Computer Science and Engineering

سال: 2020

ISSN: 2278-3091

DOI: 10.30534/ijatcse/2020/247942020