نتایج جستجو برای: forensics

تعداد نتایج: 3917  

2010
Lynn Margaret Batten Lei Pan

From a legal perspective, digital forensics is one of the most potent deterrents to digital crime. While more than a dozen definitions of digital forensics have been proposed in the last ten years, the one common element in all of them is the preparation of evidence for presentation in a court of law. In the courtroom, the expert forensic witness gives personal opinions about what has been foun...

Journal: :JCM 2012
Hsien-Ming Hsu Feng-Yu Lin Yeali S. Sun Meng Chang Chen

The simplicity and low cost of Voice over Internet Protocol (VoIP) services has made these services increasingly popular as the Internet has grown. Unfortunately, these advantages of VoIP are attractive to both legitimate and nefarious users, and VoIP is often used by criminals to communicate and conduct illegal activities (such as fraud or blackmail) without being intercepted by Law Enforcemen...

Journal: :TELKOMNIKA (Telecommunication Computing Electronics and Control) 2019

Journal: :Forensic Science International: Digital Investigation 2021

The rapid growth and usefulness of Internet Things (IoT) has seen it being deployed in critical strategic infrastructure sectors like healthcare, transport, agriculture, home automation, smart industries among many others. benefits comfort reliability IoT technologies to human beings have brought with them security concerns. This is due its large-scale connectivity over reliance on the internet...

2007
Michael Y.K. Kwan K. P. Chow Frank Y.W. Law Pierre K.Y. Lai

Like the traditional forensics, computer forensics involves formulation of hypotheses grounding on the available evidence or facts. Though digital evidence has been statutory witnesses for a span of time, it is a controversial issue that conclusions drawn from revealed digital evidence are subjective views without scientific justifications. There is an escalating perception that computer forens...

2011
Manish Kumar

The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throug...

2016
Shams Zawoad Ragib Hasan Anthony Skjellum

The rapid adoption of cloud computing to meet storage and computation needs has changed the way computing services and resources are used. However, because of the black-box nature and multi-tenant usage models of clouds, existing digital forensics science cannot cope with current state-of-the-art cloud architectures. Because of the fundamental characteristics of such clouds, many assumptions of...

2006
Richard Bassett Linda Bass Paul O’Brien

Computer forensics uses computer investigation and analysis techniques to collect evidence regarding what happened on a computer that is admissible in a court of law. Computer forensics requires a wellbalanced combination of technical skills, legal acumen, and ethical conduct. Computer forensics specialists use powerful software tools to uncover data to be sorted through, and then must figure o...

Journal: :CoRR 2013
Adedayo M. Balogun Shao Ying Zhu

Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Unfortunately, it is also popular as cyber-criminals' escape route from the grasp of digital forensic investigations. The direct encryption of data or ind...

Journal: :Materials Today 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید