scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
Book
20 Mar 2009
TL;DR: In this paper, the authors provide the scientific basis for examining digital forensic evidence in a legal context and provide a detailed discussion of the issues that arise when a legal action involving the formalisms of a court system is involved, and that action involves evidence consisting of binary digits.
Abstract: This book is about the examination of digital forensic evidence in legal settings. When a legal action involving the formalisms of a court system are involved, and that action involves evidence consisting of 1s and 0s (the binary digits), there are specific concerns that have to be addressed in order to provide accurate facts to those who have to make judgements based on facts. This book provides the scientific basis for examination of digital forensic evidence in a legal context.

73 citations

Proceedings ArticleDOI
04 Oct 2012
TL;DR: The authors believe that the proposed model is comprehensive and that it harmonises existing state-of-the-art digital Forensic investigation process models and can lead to the standardisation of the digital forensic investigation process.
Abstract: Digital forensics gained significant importance over the past decade, due to the increase in the number of information security incidents over this time period, but also due to the fact that our society is becoming more dependent on information technology. Performing a digital forensic investigation requires a standardised and formalised process to be followed. There is currently no international standard formalising the digital forensic investigation process, nor does a harmonised digital forensic investigation process exist that is acceptable in this field. This paper proposes a harmonised digital forensic investigation process model. The proposed model is an iterative and multi-tier model. The authors introduce the term “parallel actions”, defined as the principles which should be translated into actions within the digital forensic investigation process (i.e. principle that evidence's integrity must be preserved through the process and that chain of evidence must be preserved). The authors believe that the proposed model is comprehensive and that it harmonises existing state-of-the-art digital forensic investigation process models. Furthermore, we believe that the proposed model can lead to the standardisation of the digital forensic investigation process.

72 citations

Journal ArticleDOI
TL;DR: Cybercrime differs from traditional crime and presents a variety of unique challenges including the variety of electronic devices available, amount of data produced by these devices, the absence of standard practices and guidelines for analyzing that data, the lack qualified personnel to perform investigations and the lack of resources to provide on-going training.
Abstract: Various terms have been used to describe the intersection between computing technology and violations of the law-including computer crime, electronic crime, and cybercrime. While there remains little agreement on terminology, most experts agree that the use of electronic devices to commit crime has increased dramatically and is now commonplace. It is the role of the digital investigator to bring cybercriminals to justice. Cybercrime however differs from traditional crime and presents a variety of unique challenges including the variety of electronic devices available, amount of data produced by these devices, the absence of standard practices and guidelines for analyzing that data, the lack qualified personnel to perform investigations and the lack of resources to provide on-going training. This paper examines these challenges

72 citations

Journal ArticleDOI
TL;DR: The conclusion that can be made from this study is that planting a sensor fingerprint in an image without leaving a trace is significantly more difficult than previously thought.
Abstract: Due to a production error, the above titled paper (ibid., vol. 6, no. 1, pp. 227-236, Mar. 11), was published as a correspondence in the March 2011 issue of IEEE Transactions on Information Forensics and Security. This paper was actually accepted as a Regular Paper and should have been published as such.

71 citations

Journal ArticleDOI
TL;DR: The motivation, design, and use of DFXML are presented, and tools that have been creased that both ingest and emit D FXML files are discussed.

71 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343