• No results found

forensic investigation

A Forensic Traceability Index in Digital Forensic Investigation

A Forensic Traceability Index in Digital Forensic Investigation

... digital forensic is in- clusive of computer forensic, network forensic, software forensic and information forensic, but it is largely used interchangeably with computer forensic ...

14

Forensic investigation of social networking applications

Forensic investigation of social networking applications

... computer forensic investigation of social networking applications 18,19 ...computer forensic investigations, and would be a practical starting point for organizations intending to undertake a ...

15

How To Use Data Mining For Cyber Forensic Investigation

How To Use Data Mining For Cyber Forensic Investigation

... Researchers have employed existing state-of-the-art data mining techniques, machine learning algorithms and visualization techniquesto implement various tools and frameworks. Such tools have varied functionalities and ...

5

A generic database forensic investigation process model

A generic database forensic investigation process model

... digital forensic investigation process models have been developed to discover digital crimes of computers, networks, mobiles and ...digital forensic practices do not reflect characteristics of IT ...

13

Forensic investigation using ground penetrating radar (GPR)

Forensic investigation using ground penetrating radar (GPR)

... in forensic investigation and has become well known method because has been used in some high profile case ...or forensic team to pinpoint the suspicious areas and thus saving the unnecessary ...

31

A framework for the forensic investigation of unstructured email relationship data

A framework for the forensic investigation of unstructured email relationship data

... The continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data. Structured data provides ...

19

Cyber Crime Varient Activities and Network Forensic Investigation

Cyber Crime Varient Activities and Network Forensic Investigation

... of investigation continues after sorting out containment and recovery ...network forensic investigation culminates with network forensics examiner presenting his proceedings under the court of law ...

8

An Evaluation of the Challenges of Forensic Investigation and Unsolved Murders in Nigeria

An Evaluation of the Challenges of Forensic Investigation and Unsolved Murders in Nigeria

... on Forensic investigation and unsolved murders in ...on Forensic investigation and unsolved murders in Nigeria with a view to helping build up a literature base for this field of ...of ...

20

CDBFIP: Common Database Forensic Investigation Processes for Internet of Things

CDBFIP: Common Database Forensic Investigation Processes for Internet of Things

... a forensic investigation model was developed by Wong and Edwards [12] that consists of generic steps to discover information about an operation performed on the database ...or forensic analyst to ...

16

A Forensic Investigation of Android Mobile Applications

A Forensic Investigation of Android Mobile Applications

... a forensic investigation to a set of Android mobile applications aiming at discovering sensitive information related to the owner of the mobile ...a forensic analysis can reveal crucial and ...

6

Graph-based forensic investigation of Bitcoin transactions

Graph-based forensic investigation of Bitcoin transactions

... to forensic questions regarding specified time interval and/or a selected set of user ...graph-based forensic investigation approaches are expected to help law enforcement in their investigations ...

75

Forensic Investigation of Clandestine Laboratories pdf

Forensic Investigation of Clandestine Laboratories pdf

... the investigation and prosecution of clandestine labs cannot be expected to have acquired the scientific knowledge necessary to understand the chemical processes ...In Forensic Investigation of ...

371

Application of 3D scanning technology in forensic investigation of bite marks

Application of 3D scanning technology in forensic investigation of bite marks

... Forensic investigation of bite-marks on humans has the potential to provide evidence that can be used to identify the perpetrator of a ...valid forensic technique it has great potential in the ...

177

The Role of Biological and Serological Exhibits as Corroboration Evidence in Forensic Investigation

The Role of Biological and Serological Exhibits as Corroboration Evidence in Forensic Investigation

... 4) Blood: Blood is the most common, well-known and perhaps most important evidence in the world of criminal justice today. Its presence always links suspect and victim to one another and the scene of violence. Over the ...

9

A model for validation and verification of disk imaging in computer forensic investigation

A model for validation and verification of disk imaging in computer forensic investigation

... With the development of modern computers and networks, computer-related crimes has become a threat to society because of the immense damage it can inflict while at the same time it has reached a level of sophistication ...

20

Computer Anti forensics Methods and their Impact on Computer Forensic Investigation

Computer Anti forensics Methods and their Impact on Computer Forensic Investigation

... The conducted experiments proved that not all counter-forensics techniques are effi- cient when compared against forensics software. In many cases tools failed to hide or delete important data. It is highly likely that ...

11

Forensic Investigation Of Amazon Cloud Drive On Windows 10

Forensic Investigation Of Amazon Cloud Drive On Windows 10

... Internet brings a lot of convenience for modern life, but also caused many emerging crime problems. Since the information technology and mobile networks developed, resulting in crime figures increase rapidly. It is also ...

5

Forensic investigation of burnt human remains

Forensic investigation of burnt human remains

... burnt bone is too fragile to be cut mechanically, so this CT imaging is essential to be able to observe the inner structure of the bone. Figure 4 shows enlarged images of the human and bovine compact bones obtained using ...

8

Forensic Investigation Of Google+ On Windows 10

Forensic Investigation Of Google+ On Windows 10

... Social networking is increasingly popular among individuals and business organizations. Applications such as Google+, Facebook, YouTube, Twitter, and LinkedIn are some of the commonly used applications. With the ...

7

Forensic investigation  A tool for classification of gender

Forensic investigation A tool for classification of gender

... Gender classification problem is an active research area which has attracted a great deal of attention recognition problem. Generally gender classification involves a process of determining the gender. Gender is among ...

6

Show all 10000 documents...

Related subjects