نتایج جستجو برای: forensics
تعداد نتایج: 3917 فیلتر نتایج به سال:
Recent papers have urged the need for new forensic techniques and tools able to investigate anti-forensics methods, and have promoted automation of live investigation. Such techniques and tools are called proactive forensic approaches, i.e., approaches that can deal with digitally investigating an incident while it occurs. To come up with such an approach, a Systematic Literature Review (SLR) w...
The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that de...
1. Introduction Traditional information security research focuses on defending systems against attack before they happen. More recently, security auditing has evolved to intrusion detection systems that are concerned with recognizing attacks and taking action to curb further damage at the time of the attack. Comparatively little research has focused on after the fact investigation, partly becau...
There are no general frameworks with which we may analyze the anti-forensics situation. Solving anti-forensic issues requires that we create a consensus view of the problem itself. This paper attempts to arrive at a standardized method of addressing anti-forensics by defining the term, categorizing the anti-forensics techniques and outlining general guidelines to protect forensic integrity. a 2...
Today, digital forensics (also known as computer forensics) already is a common instrument in forensic investigations. It is due to its massive presence in the media that digital forensics more and more comes to the public mind, too. However, today’s practices and methods are of a more pragmatic kind and a comparison with other forensic sciences shows clear deficits. Those deficits can be divid...
Title of dissertation: FUNDAMENTAL LIMITS IN MULTIMEDIA FORENSICS AND ANTI-FORENSICS Xiaoyu Chu, Doctor of Philosophy, 2015 Dissertation directed by: Professor K. J. Ray Liu Department of Electrical and Computer Engineering As the use of multimedia editing tools increases, people become questioning the authenticity of multimedia content. This is specially a big concern for authorities, such as ...
(Dartmouth College) were members of the doctoral committee. The thesis was supported by a scholarship from Deutsche Telekom Stiftung (Bonn, Germany). Parts of the third chapter were co-authored by Rainer Böhme and have been published as a book chapter " Counter-Forensics: Attacking Image Forensics " in the book " Digital Image Forensics. There is More to a Picture than Meets the Eye " , edited ...
Like so many things in our just-in-time world, this book was sent to me just as one of my colleagues was looking for a text for a course he was developing in computer forensics laboratory operations and management. The two lead authors—and contributing author P. Swinburne—bring decades of experience in military and law enforcement environments in Australia and the UK to these topics. The book p...
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید