Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

نویسندگان

  • Chang-Tsun Li
  • Martin Steinebach
  • Antonio Savoldi
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Massively Threaded Digital Forensics Tools

Digital forensics comprises the set of techniques to recover, preserve, and examine digital evidence and has applications in a number of important areas, including investigation of child exploitation, identity theft, counter-terrorism, and intellectual property disputes. Digital forensics tools must exhaustively examine and interpret data at a low level, because data of evidentiary value may ha...

متن کامل

Testing Digital Forensic Software Tools Used in Expert Testimony

From a legal perspective, digital forensics is one of the most potent deterrents to digital crime. While more than a dozen definitions of digital forensics have been proposed in the last ten years, the one common element in all of them is the preparation of evidence for presentation in a court of law. In the courtroom, the expert forensic witness gives personal opinions about what has been foun...

متن کامل

Legal Issues for Research and Practice in Computational Forensics

These special issues of reliability require that the principles, method, application and expert using a CF system be validated as accurate, relevant, competent and appropriate for use by a finder-of-fact to an identified level of confidence. This testing for appropriate forensic use is especially important as conclusions from the results of these systems may have serious impact on the life and ...

متن کامل

Deception Detection on the Internet

This chapter provides an overview of techniques and tools to detect deception on the Internet. A classification of state-of-the-art hypothesis testing and data mining based deception detection methods are presented. A psycho-linguistics based statistical model for deception detection is also described in detail. Passive and active methods for detecting deception at the application and network l...

متن کامل

Challenges and Solutions in Multimedia Document Authentication

Multimedia data becomes more and more relevant for applications that require a certain level of trust in the integrity and the authenticity of documents. Examples include scanned contracts and documents which integrity needs to be verified, photos or video clips attached to news reports which contents should be provably authentic or recordings of interviews which shall be used as evidence in th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010