Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
نویسنده
چکیده
منابع مشابه
Digital Forensics to Intelligent Forensics
In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of d...
متن کاملA Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail Forensics
There is an alarming increase in the number of cybercrime incidents through anonymous e-mails. The problem of e-mail authorship attribution is to identify the most plausible author of an anonymous e-mail from a group of potential suspects. Most previous contributions employed a traditional classification approach, such as decision tree and Support Vector Machine (SVM), to identify the author an...
متن کاملComparative study of Authorship Identification Techniques for Cyber Forensics Analysis
Authorship Identification techniques are used to identify the most appropriate author from group of potential suspects of online messages and find evidences to support the conclusion. Cybercriminals make misuse of online communication for sending blackmail or a spam email and then attempt to hide their true identities to void detection.Authorship Identification of online messages is the contemp...
متن کاملMobile Forensics "triaging": new directions for methodology
Over the past few years Mobile Forensics, the branch of Digital Forensics that deals with gathering, retrieving, identifying, storing and documenting mobile phone’s evidence with probative value in court, has become more and more specialized. Nowadays, specific extraction tools have been developed in order to acquire and store phone’s content and digital evidence, in compliance with forensic me...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JDFSL
دوره 8 شماره
صفحات -
تاریخ انتشار 2013