scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Journal ArticleDOI
20 Sep 2014
TL;DR: 6th International Conference on Digital Forensics and Cyber Crime (ICDF2C 2014), New Haven, Connecticut, United States, 18-20 September 2014
Abstract: 6th International Conference on Digital Forensics and Cyber Crime (ICDF2C 2014), New Haven, Connecticut, United States, 18-20 September 2014

22 citations

Book ChapterDOI
01 Jan 2010
TL;DR: This work summarizes biometric evidence as well as file type evidence extraction “exported” as formal Forensic Lucid language expression in the form of higher-order intensional contexts for further case analysis by a system that interprets ForensicLucid expressions for claim verification and event reconstruction.
Abstract: In this work we summarize biometric evidence as well as file type evidence extraction “exported” as formal Forensic Lucid language expression in the form of higher-order intensional contexts for further case analysis by a system that interprets Forensic Lucid expressions for claim verification and event reconstruction The digital evidence is exported from the Modular Audio Recognition Framework (MARF)’s applications runs on a set of data comprising biometric voice recordings for speaker, gender, spoken accent, etc as well as more general file type analysis using signal and pattern recognition processing techniques The focus is in translation aspect of the extracted evidence into formal Forensic Lucid expressions for further analysis

22 citations

Journal ArticleDOI
TL;DR: The proposed Blockchain cloud forensic logging framework will ensure trustworthiness, integrity, authenticity and non-repudiation of the log evidence in the cloud, and enhance and strengthen compliance with the European Union (EU) General Data Protection Regulation (GDPR).

22 citations

Journal ArticleDOI
01 Jan 2014
TL;DR: An extension to Reith's abstract digital forensics model explicating preservation of integrity and protection of human rights as the two necessary umbrella principles is proposed.
Abstract: In this research, a literature review was conducted where twenty (n=20) frameworks and models highlighting preservation of the integrity of digital evidence and protection of basic human rights during digital forensic investigations were studied. The models not discussing the process at an abstract level were excluded. Therefore, thirteen (n=13) of the studied models were included in our analysis. The results indicated that published abstract models lack preserving the integrity of digital evidence and protecting the basic human rights as explicit overarching umbrella principles. To overcome this problem, we proposed an extension to Reith's abstract digital forensics model explicating preservation of integrity and protection of human rights as the two necessary umbrella principles.

22 citations

Journal ArticleDOI
TL;DR: Through a consideration of types of crimes involving Smartphone’s, a real case study from the Sultanate of Oman is presented, which undertakes practical experiments to identified sources for evidence that can later be used in the judiciary system.
Abstract: —Smartphone forensics is a sub-set of digital forensics, and refers to the investigation and acquisition of artefacts in mobile phones. New threats to mobile phones made forensic science a challenging endeavour in the last couple of years. Number of mobile users is increasing worldwide and createstremendous problems and challenges. The literature relevant to Smartphone forensics, as explored in this paper, focuses on the architecture of Smartphone operating systems and anti-forensics techniques. It also addresses the digital evidence of Smartphone applications. In this paper, through a consideration of types of crimes involving Smartphone’s, a real case study from the Sultanate of Oman is presented. This case study undertakes practical experiments to identified sources for evidence that can later be used in the judiciary system.

22 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111