scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
Book ChapterDOI
14 Sep 2005
TL;DR: The requirements of digital image forensics which underpin the design of the forensic image mining system are discussed and a Bayesian networks approach is proposed to deal with information uncertainties which are inherent in forensic work.
Abstract: Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper discusses the requirements of digital image forensics which underpin the design of our forensic image mining system. This system can be trained by a hierarchical Support Vector Machine (SVM) to detect objects and scenes which are made up of components under spatial or non-spatial constraints. Forensic investigators can communicate with the system via a grammar which allows object description for training, searching, querying and relevance feedback. In addition, we propose to use a Bayesian networks approach to deal with information uncertainties which are inherent in forensic work. These inference networks will be constructed to model probability interactions between beliefs, adapt to different users' retrieval patterns, and mimic human judgement of semantic content of image patches. An analysis of the performance of the first prototype of the system is also provided.

34 citations

Journal ArticleDOI
TL;DR: The Framework for Reliable Experimental Design (FRED) is proposed, designed to be a resource for those operating within the digital forensic field, both in industry and academia, to support and develop research best practice within the discipline.

34 citations

Journal ArticleDOI
TL;DR: The curriculum was designed with the express intent of distributing it as a self-contained curriculum package with everything needed to teach the course, and the revisions made based on this experience and feedback from students are described.

34 citations

Journal ArticleDOI
TL;DR: This state-of-the-art review includes the most recent research eorts that used \cloud forensics" as a keyword and classify the literature into three dimensions: (1) survey-based, (2) technology-based and (3) forensics-procedural-based.
Abstract: Cloud computing and digital forensics are emerging elds of technology. Unlike traditional digital forensics where the target environment can be almost completely isolated, acquired and can be under the investigators control; in cloud environments, the distribution of computation and storage poses unique and complex challenges to the investigators. Recently, the term \cloud forensics" has an increasing presence in the eld of digital forensics. In this state-of-the-art review, we included the most recent research eorts that used \cloud forensics" as a keyword and then classify the literature into three dimensions: (1) survey-based, (2) technology-based and (3) forensics-procedural-based. We discuss widely accepted standard bodies and their eorts to address the current trend of cloud forensics. Our aim is not only to reference related work based on the discussed dimensions, but also to analyse them and generate a mind map that will help in identifying research gaps. Finally, we summarize existing digital forensics tools and the available simulation environments that can be used for evidence acquisition, examination and cloud forensics test purposes.

34 citations

Journal Article
TL;DR: A forensic tool to acquire cell phone flash memory data using a logical level approach is described and can get EFS file system and peek memory data with an arbitrary region from Korea CDMA cell phone.
Abstract: — Cell phone forensics to acquire and analyze data in the cellular phone is nowadays being used in a national investigation organization and a private company In order to collect cellular phone flash memory data, we have two methods Firstly, it is a logical method which acquires files and direct ories from the file system of the cell phone flash memory Secondly, we can get all data from bit-by-bit copy of entire physical memory using a low level access method In this paper, we describe a forensic tool to acquire cell phone flash memory data using a logical level approach By our tool, we can get EFS file system and peek memory data with an arbitrary region from Korea CDMA cell phone Keywords — Forensics, logical method, acquisition, cell phone, flash memoryI I NTRODUCTION S digital evidence that kept in the various electronic media such as a computer and a mobile device in the digital crime is recently increasing, digital forensic technology to prove the crime is being more and more important Especially, if the critical evidence is stored in the mobile devices, mobile forensic technology is demanded to find out the evidence without damage of the evidence Mobile devices include small scale digital devices, embedded system, portable storage devices, and obscure devices And, as to the small scale digital devices, there are various types of cell phones, USIM, PDA, navigation system, game player, and so on In this paper, we are focusing in acquiring and analyzing data in the cell phone User data such as phonebook, call history, SMS, and photo and hardware-related data such as IMSI, MIN, and ESN are mainly stored in the NAND flash memory and the NOR flash memory of the cell phone In case of Korea, most of

33 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343