scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
01 Jan 2011
TL;DR: The aim of this paper is to compare different existing models and framework developed in recent years and propose a new framework based on “chain of digital evidence”, modeled using a UML – Use Case and Activity diagrams.
Abstract: Computer forensics is essential for the successful prosecution of criminals in computer (cyber) crime. Digital investigation process must be done in a lawful way, and some proposed steps must be followed in order for evidence to be accepted by the court of law. The digital forensic investigation process will be successful, if we follow simple rules. The aim of this paper is to compare different existing models and framework developed in recent years and propose a new framework based on “chain of digital evidence”. This Framework will be modeled using a UML – Use Case and Activity diagrams. The authors also warns of certain shortcomings and suggests some recommendation for further research.

7 citations

01 Jul 2015
TL;DR: The diversification of iPhone evidence is observed via the comparison between before and after performing Jailbreak procedure by using XRY forensic commercial tool kit and Apple iTunes logical extraction and provides a summary report about iPhone evidence and digital forensics as a court reference.
Abstract: The smartphone has gradually become an indispensable assistant in our daily life. Apple's iPhone is one of the most popular smartphones. However, once the iPhone has become a criminal tool for assisting the offender, the electromagnetic record in the iPhone will become the key digital evidence to reconstruct the scene of the crime. There is a high probability that offenders perform the Jailbreak procedure in order to gain more powerful functions on iPhones. When the Jailbreak work has processed, this will make the implementation of digital forensic extraction smoother. Otherwise, there is controversy surrounding iPhone evidencehandling if the forensic investigators perform the Jailbreak procedure for the non-Jailbroken iPhone just to make the implementation of digital forensic extraction easier. Therefore, this paper observes the diversification of iPhone evidence via the comparison between before and after performing Jailbreak procedure by using XRY forensic commercial tool kit and Apple iTunes logical extraction. We not only clarify the controversy of whether the key-evidence on the iPhone after its Jailbroken will be varied or not, but also provide a summary report about iPhone evidence and digital forensics as a court reference.

7 citations

Book ChapterDOI
01 Jan 2004
TL;DR: The operational and legal issues related to digital evidence are discussed and the current needs and future research opportunities are highlighted.
Abstract: With more than 93% of the world’s data being computer generated [23], digital forensics offers significant opportunities and challenges. This paper discusses the operational and legal issues related to digital evidence. In addition, it highlights current needs and future research opportunities.

7 citations

Journal ArticleDOI
TL;DR: An Enhanced Multiclass Support Vector Machine (EMSVM) model is proposed that aims to improve the classification performance of digital forensic and investigates the applicability of the proposed model in analysing incriminating digital evidence by inspecting the historical activities of file systems to realize if a malicious program manipulated them.

7 citations

Journal ArticleDOI
01 Jan 2020
TL;DR: The paper assesses the effectiveness of legal infrastructure, technical mechanisms, the availability of capacity building programs, organisational infrastructure as well as the existence of cooperation mechanisms among relevant institutions in Ghana to conclude that DFI is still at an infant stage.
Abstract: Cybercrime incidents continue to plague economic development in the African region. Prior research indicates that millions of dollars are lost annually due to this menace. The prospects of Digital Forensics Investigation (DFI) as evident in developed countries provide hope for defeating cybercriminals. The paper assesses the effectiveness of legal infrastructure, technical mechanisms, the availability of capacity building programs, organisational infrastructure as well as the existence of cooperation mechanisms among relevant institutions in Ghana. The paper contends to the existence of legislation and mandated institutions. It concludes that, though the sector has recorded advancements over the years, the progress has been very slow leaving DFI still at an infant stage. Existing legislations are scattered and cumbersome whereas mandated institutions lack the requisite capacity. There is a need to streamline existing laws into a comprehensively harmonized legal framework. Furthermore, heavy investments must be deployed to boost the capacities of relevant institutions.

7 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111