scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
Proceedings ArticleDOI
21 Mar 2012
TL;DR: The forensic techniques will be used to track where exactly the crime has taken place and where the valuable data are hidden, which are the mails have been sent and received from the seized computer system.
Abstract: The utilization of computer has increased and at the same time digital crime has also increased. In olden days physical robbery was very high and now because of the advanced techniques to carry money and other valuables like ATM, people utilize the computer system to carry out robbery. Just like the olden days, where crime has to be investigated; now too the investigator has to investigate the digital crime. This paper presents some of the tools & techniques to analyze the digital crime. The forensic techniques will be used to track where exactly the crime has taken place and where the valuable data are hidden, which are the mails have been sent and received from the seized computer system. The forensic analysis tools are used to analyze the data and to recover the deleted or hidden data from the digital devices.

17 citations

Book ChapterDOI
Richard Adams1
01 Jan 2013
TL;DR: This chapter looks at the issues surrounding digital evidence acquisition and introduces a new high-level process model that can assist digital forensic practitioners when it comes to presenting evidence in court that originated in the cloud.
Abstract: Cloud computing is just one of many recent technologies that have highlighted shortcomings in the development of formal digital forensic processes, which up until now have been focused on a particular group of practitioners, such as law enforcement, and have been too high-level to be of significant practical use, or have been too detailed and specific to accommodate new technology as it emerges. Because the tools and procedures employed by digital forensic practitioners are generally outside the knowledge and understanding of the courts, they need to be described in such a way that they can be understood by the layperson. In addition, they should also conform to some standards of practice and be recognised by other practitioners working in the field (Armstrong, 2003; Kessler, 2010). Unfortunately, as Cohen (2011) points out, the whole field of digital forensics lacks consensus in fundamental aspects of its activities in terms of methodology and procedures. There has been a lot of activity around different aspects of cloud computing, and in Australia this has centered on the protection of personal data (Solomon, 2010). On an international scale, there have been several articles written by lawyers (Gillespie, 2012; Hutz, 2012; Kunick, 2012) discussing other legal considerations of accessing data in the cloud; however, this chapter looks at the issues surrounding digital evidence acquisition and introduces a new high-level process model that can assist digital forensic practitioners when it comes to presenting evidence in court that originated in the cloud.

17 citations

Journal ArticleDOI
30 Mar 2017
TL;DR: Singer proposes journal Forensic analysis of life in the latest operation system windows 10 and compares browser security information so it will be more minimize abuse email.
Abstract: Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.

17 citations

Journal ArticleDOI
TL;DR: An Artificial Intelligence Based Digital Forensics Framework is proposed in this paper to overcome above issues and require minimum user interaction and does majority of routine operations by intelligence acquired from training.
Abstract: With increase in number of Internet and smartphone users, cyber crimes are equally increased. Current resources including man power are not sufficient to investigate and solve cyber crimes with the pace they are committed. Present tools and technology require human interaction at large scale, which slows down the process. There is acute need to optimize speed and performance of Digital Forensic Tools to keep pace with the reported cyber crimes. An Artificial Intelligence Based Digital Forensics Framework is proposed in this paper to overcome above issues. The framework proposed in this paper require minimum user interaction and does majority of routine operations by intelligence acquired from training. Outcome of the work is mentioned in the form of proposed framework to optimize digital forensics process.

17 citations

Proceedings ArticleDOI
24 Sep 2014
TL;DR: A multi-layered architecture designed to assist the investigative team in the extraction of information left in the crime scene, the construction of the timeline representing the incident and the interpretation of this latter is introduced.
Abstract: To determine the circumstances of an incident, investigators need to reconstruct events that occurred in the past. The large amount of data spread across the crime scene makes this task very tedious and complex. In particular, the analysis of the reconstructed timeline, due to the huge quantity of events that occurred on a digital system, is almost impossible and leads to cognitive overload. Therefore, it becomes more and more necessary to develop automatic tools to help or even replace investigators in some parts of the investigation. This paper introduces a multi-layered architecture designed to assist the investigative team in the extraction of information left in the crime scene, the construction of the timeline representing the incident and the interpretation of this latter.

17 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343