scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Proceedings ArticleDOI
01 Oct 2018
TL;DR: A literature review about how cyber forensics is addressed at clients’ side related to techniques of identification, collection, analysis, preservation and report of digital evidence and a review of how standards are being used in cyberForensics focused on the client side are presented.
Abstract: Nowadays, with the demand of web applications there is also an increase in the number of problems and crimes that demand an investigation that requires digital forensics techniques in order to manage web evidence. Although there are several studies that address cyber forensics, they are mainly oriented to manage evidence at server side, as far as we know, no systematic literature reviews have been reported on how cyber forensics is addressed at clients’ side; considering the internationals standards. Thus, this paper presents a literature review about how cyber forensics is addressed at clients’ side related to techniques of identification, collection, analysis, preservation and report of digital evidence. Also, a review of how standards are being used in cyber forensics focused on the client side. The aim of this study is to provide a background of relevant activities that are considered by investigators to handle potentially digital evidence from web environments, considering what internationals standards are solving for this purpose. Thus, a total of 37 studies have been selected and analyzed in this study. Moreover, this study provides important insights about the need to create methodologies aligned with formal standards that support the management of the evidence in an appropriate way.

3 citations

Book ChapterDOI
19 Mar 2020
TL;DR: The purpose of this research is to distinguish the notion of legal, forensic and IT functioning of artificial intelligence in current criminal investigation methods.
Abstract: Purpose: The purpose of this research is to distinguish the notion of legal, forensic and IT functioning of artificial intelligence in current criminal investigation methods.

3 citations

Journal ArticleDOI
29 Aug 2017
TL;DR: This study develops a forensic multimedia framework by implementing the Composite Logic to collaborate on several multimedia framework and related documents using Logic Composite method, a method of modeling the distribution of structured logical modularization techniques with explicit interface.
Abstract: Like the digital forensics in general, multimedia forensics requires an integrated and flexible framework that can guide the process of proof is procedurally in order to maintain the validity of a digital evidence so that it can be justified in court. But this time, the digital forensics investigation framework that develops more emphasis on computer forensic investigations in general and did not give a specific stage of multimedia forensics. Often in investigating multimedia forensics investigator uses a framework that vary depending on the type of multimedia content to be analyzed, of course it becomes inflexible and inefficient, whereas multimedia content share characteristics that allow it to be integrated into a single unit. This study develops a forensic multimedia framework by implementing the Composite Logic to collaborate on several multimedia framework and related documents. Logic Composite method is a method of modeling the distribution of structured logical modularization techniques with explicit interface in which a model consists of a set of components that are interconnected with the principle of decomposition. In other words, the application of this method will allow researchers to extract and merge several frameworks into a single unit does not eliminate the function and the basic structure of the frameworks.

3 citations

Book ChapterDOI
01 Jan 2017
TL;DR: This chapter provides a discussion on what cybercrime is, from the author’s perspective and gives the reader a presentation on how and in what cases digital evidence can be of use during criminal investigations.
Abstract: Computer forensic experts are commonly faced with the misconception that they work primarily on cybercrimes. The reality is quite opposite, namely that digital forensics is of importance in pretty much every possible type of crime ranging from computer intrusions to theft. This chapter provides a discussion on what cybercrime is, from the author’s perspective. But more importantly, this chapter gives the reader a presentation on how and in what cases digital evidence can be of use during criminal investigations. The aim of the chapter is to make the reader understand that in the modern world, we leave digital traces almost all the time. We may not always be aware of this fact, but knowing and understanding how digital traces are left behind is of great importance for a computer forensic expert. For instance, even if a criminal is conducting a crime without so much as looking at her phone or computer, chances are that she is a using chat client to talk to some friend about what she did. This action can leave incriminating evidence that can be valuable in court.

3 citations

Book ChapterDOI
TL;DR: A digital evidence protection model with batch-verifying and public verifiability is proposed to protect the generated digital evidence in time to account for the entire time between generation and presentation.

3 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111