scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
Journal ArticleDOI
TL;DR: This research is to understand how machine learning can be used in digital crime and its forensic importance, setting up an environment to train artificial neural networks and investigate as well as analyze them to find artefacts that can be helpful in forensic investigation.
Abstract: The objective of this research is to understand how machine learning can be used in digital crime and its forensic importance, setting up an environment to train artificial neural networks and investigate as well as analyze them to find artefacts that can be helpful in forensic investigation.

18 citations

Journal ArticleDOI
TL;DR: This analysis shows that, by offloading some computation to the GPUs, it is possible to successfully hide some malicious behavior in GPU-assisted malware.

18 citations

Journal ArticleDOI
TL;DR: Current efforts, ongoing work, and implications for future development of forensic-based, analytic software for born-digital materials for collecting institutions' workflows are described.
Abstract: This paper introduces the BitCurator Project, which aims to incorporate digital forensics tools and methods into collecting institutions' workflows. BitCurator is a collaborative effort led by the School of Information and Library Science (SILS) at the University of North Carolina at Chapel Hill and Maryland Institute for Technology in the Humanities (MITH) at the University of Maryland. The project arose from a perceived need in the library/archives community to develop digital forensics tools with interfaces, documentation, and functionality that can support the workflows of collecting institutions. This paper describes current efforts, ongoing work, and implications for future development of forensic-based, analytic software for born-digital materials.

18 citations

Journal ArticleDOI
TL;DR: This research analyzed default artifacts location, history, cookies, login data, topsides, shortcuts, user profile, prefetch file and RAM dump to collect artifacts related to internet activities on windows installed Google Chrome.
Abstract: Internet users use the web browser to perform various activities on the internet such as browsing internet, email, internet banking, social media applications, download files- videos etc. As web browser is the only way to access the internet and cybercrime criminal uses or target the web browser to commit the crime related to internet. It is very important for the digital forensic examiner to collect and analysis artifacts related to web browser usage of the suspect. There are various browsers available in the market such as Google Chrome, Internet Explorer, Firefox Mozilla, Safari and Opera etc, among which Google Chrome is very popular among the internet user community. Our literature survey shows that most of the researches used prefetch file and live memory analysis as source of information to extract artifacts. In this research paper, we analyzed default artifacts location, history, cookies, login data, topsides, shortcuts, user profile, prefetch file and RAM dump to collect artifacts related to internet activities on windows installed Google Chrome. The outcome of this research will serve to be a significant resource for law enforcement, computer forensic investigators, and the digital forensics research community.

18 citations

Journal ArticleDOI
01 Jul 2018
TL;DR: A pilot study on a subset of the forensics questions for cybersecurity courses showed that the students quickly adapted to the format, found it useful, and highly recommended the approach be extended to a wider range of subjects.
Abstract: Over the past few years, a team at the University of New Orleans has worked to develop, and evaluate the effectiveness of, a set of 280 questions for three common cybersecurity courses—Introduction to Computer Security, Digital Forensics, and Network Penetration Testing. We performed a pilot study on a subset of the forensics questions in a workshop and found promising evidence of gains in student learning. The study showed that the students quickly adapted to the format, found it useful, and highly recommended the approach be extended to a wider range of subjects.

18 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343