scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
01 Jan 2012
TL;DR: In this paper, a comprehensive review on various techniques that helps to improve the system, analysis of different attack, detection of attack is presented, focusing on the critical stages of preservation and acquisition of digital evidence from the different source to be used as evidence for aiding investigation.
Abstract: Network forensics has been the most prevalent technology to investigate different attack. It used for troubleshooting connection issues and helping to solve various network security problems, such as system log, router log, and access control. Network Forensic help to identify the evidences of data source as intermediate side and the end sides. This paper gives comprehensive review on various techniques that helps to improve the system, analysis of different attack, detection of attack. It focuses on the critical stages of preservation and acquisition of digital evidence from the different source to be used as evidence for aiding investigation.

3 citations

Proceedings ArticleDOI
29 Sep 2015
TL;DR: During the three course sequence, students learn forensic tools, procedures, and how to get information from chips removed from cell phone boards.
Abstract: Cell Phone Forensics is a relatively new field when compared to computer forensics. The need to recover data from mobile devices often overwhelms the processing capabilities of most law enforcement agencies. This paper outlines a three course sequence in mobile digital forensics that has been developed in partnership with law enforcement and forensic tool manufacturers. During the three course sequence, students learn forensic tools, procedures, and how get information from chips removed from cell phone boards. This dynamic partnership has been beneficial to all parties and potential employers are seeking graduates with these new forensic skills.

3 citations

Journal ArticleDOI
TL;DR: The process of the forensic investigation of peer-to-peer networks, and the issues relating to obtaining digital evidence from such peer- to- peer networks are examined.

3 citations

Book ChapterDOI
01 Jan 2012
TL;DR: This paper analyzes several recent cases and introduces general regulations governing the collection and the presentation of digital evidence in China, and concludes that stricter technical protocols and standards should be written into the law in China.
Abstract: This paper analyzes several recent cases and introduces general regulations governing the collection and the presentation of digital evidence in China. To ensure the integrity, authenticity, and originality of the obtained digital evidence, the collection and examination of digital evidence requires strict compliance of technical protocols. In any litigation related to digital evidence, forensic experts can play a role in cross-examine the forensic expertise. In judging the reliability of digital evidence, however, in addition to the reliability of scientific principles, should we put more emphasis on the reliability of scientific inference? In conclusion, in order to provide for greater application of digital evidence in fact-finding, the following considerations are important: stricter technical protocols and standards should be written into the law in China; general rules in the evidence law should not be ignored but applied to digital evidence with the emphasis of uniqueness and technicality of digital evidence; and, the judge’s discretion carries a very special meaning.

3 citations

Journal ArticleDOI
TL;DR: An overview of preservation issues, solutions for examiners, and tips for successful preservation of hand-held devices is provided.
Abstract: Cell phones, pagers and other personal digital assistants (PDAs) provide people with the ability to exchange pictures, check email, surf the Web, capture videos, listen to music, or watch movies in the palm of their hand. The future holds even greater promise as these devices may be used as “digital wallets” to pay bills, check account balances, and store other forms of data. In some circumstances, however, a handheld device can become the focus of litigation, investigation, or law enforcement action. At that point, a tool of convenience becomes a source of digital evidence. Digital forensic examiners may be called upon to preserve a wide variety of handheld devices that can produce critical evidence, including email, call logs, pictures, password, videos, user-created documents, and text messages. As PDAs, cell phones, and other handheld devices integrate new technologies for communications and data storage, they will continue to emerge as sources of additional evidence in criminal and civil investigations. Consequently, digital forensic examiners must know how to preserve and acquire data effectively on handheld communication devices. This article provides an overview of preservation issues, solutions for examiners, and tips for successful preservation of hand-held devices.

3 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111