scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
Journal ArticleDOI
TL;DR: A theoretical and formal knowledge model for forensic automation on online social networks consists of an event-based knowledge model, which provides theoretical concepts that can assist in the construction and interpretation of the events related to the incident under investigation.

18 citations

Proceedings Article
01 Dec 2012
TL;DR: A survey on the current data acquisition methods of digital forensics for mobile phones is conducted and a comparative analysis between the currentData acquisition methods is provided.
Abstract: Today mobile phone devices are everywhere and they hold a great deal of information about the owner and their activities As a result of the widespread adoption of these devices into every aspect of our lives, they will be involved in almost any crime that occurs The aim of the digital forensics of mobile phones is to recover potential digital evidence in a forensically sound manner so that it can be presented and accepted in court There are several methods to acquire evidence from mobile phones In this paper, we have conducted a survey on the current data acquisition methods Then, we provide a comparative analysis between the current data acquisition methods

18 citations

Proceedings ArticleDOI
04 Jan 2011
TL;DR: A preliminary research hierarchy for legal issues associated with digital forensics is introduced and Topics discussed include constitutional law, property law, contract law, tort law, cybercrime, criminal procedure, evidence law, and cyber war.
Abstract: The evolution of the Information Age has necessitated and facilitated the relatively new field of digital forensics. As a largely practitioner-driven field, there is no clearly defined research agenda to promote top-down research in related areas so that the evolution can be more solidly based on research findings. This paper builds on previously published topical research agendas for digital forensics and introduces a preliminary research hierarchy for legal issues associated with digital forensics. Topics discussed include constitutional law, property law, contract law, tort law, cybercrime, criminal procedure, evidence law, and cyber war. In addition some special associated problems and overarching areas are identified for consideration and for future research.

18 citations

Proceedings ArticleDOI
27 Jul 2010
TL;DR: The aim of this paper is to examine the current methods involved in the forensic examination of mobile phones and to identify those areas of mobile phone examination where the current United Kingdom ACPO guidelines and the United States of America NIST guidelines are unclear or insubstantial.
Abstract: Digital evidence is proving increasingly pivotal in criminal investigations whether it is an arrest for a minor offence or a more serious activity. As people rely on mobile phones and their many functions, the digital trail of evidence continues to grow. The forensic examination of mobile phones is a relatively new discipline and research activity into the forensic analysis of these types of phones, and the information they may contain, is limited when compared to the exponential increase in ownership of these types of phones. The amount of ubiquitous information stored on mobile phones will continue to grow as their processing power and storage capacity increases and the phones incorporate more functionality and applications. Guidelines, publications and research into the more traditional digital forensic examination of computer hard disks are well documented, whereas for mobile phones, the publications and research are not that established. The aim of this paper is to examine the current methods involved in the forensic examination of mobile phones and to identify those areas of mobile phone examination where the current United Kingdom ACPO guidelines and the United States of America NIST guidelines are unclear or insubstantial.

18 citations

Proceedings ArticleDOI
01 Oct 2010
TL;DR: The challenges of digital forensics, related literature, topics involved, current options for performing forensics on databases as well as considerations in teaching database forensics are analyzed.
Abstract: At the user or surface level, most Database Management System (DBMS) are similar. Most databases contain multiple tables, a standardized query language, primary key, foreign key, referential integrity, and metadata. With regard to physical file structures, concurrency mechanisms, security mechanisms, query optimization and datawarehouse techniques, databases may be radically different from each other. Most Forensic tools are too time consuming to be applied to large databases. Meanwhile, database tools such as oracle logminer and auditing features can assist in forensics, but were not created for that purpose. Many of these tools alter the database in ways that may complicate the use of their results in a legal proceeding. This paper analyzes the challenges of digital forensics, related literature, topics involved, current options for performing forensics on databases as well as considerations in teaching database forensics.

18 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343