Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer Forensics (3)
- Digital forensics (3)
- Digital evidence (2)
- Evidence (2)
- ACPO (1)
-
- ACR (1)
- ADSL routers (1)
- Admissibility (1)
- Android (1)
- Attribution (1)
- Automatic Crash Recovery (1)
- Barbara van Schewick (1)
- BitMatch (1)
- Book Review (1)
- Browsing history (1)
- Bytecode (1)
- Cloud computing (1)
- CodeMatch (1)
- CodeSuite (1)
- Communities of practice (1)
- Compound files. (1)
- Computer Engineering (1)
- Computer forensics (1)
- Copying (1)
- Curriculum (1)
- Cyber safety (1)
- Cyber security (1)
- DNS (1)
- Decision support (1)
- Decompiling (1)
Articles 31 - 35 of 35
Full-Text Articles in Computer Engineering
Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model, Gary Cantrell, David A. Dampier
Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model, Gary Cantrell, David A. Dampier
Journal of Digital Forensics, Security and Law
Digital triage is a pre-digital-forensic phase that sometimes takes place as a way of gathering quick intelligence. Although effort has been undertaken to model the digital forensics process, little has been done to-date to model digital triage. This work discusses the further development of a model that attempts to address digital triage, the Partially-automated Crime Specific Digital Triage Process model. The model itself will be presented along with a description of how its automated functionality was implemented to facilitate model testing.
Technology Corner: A Regular Expression Training App, Nick V. Flor
Technology Corner: A Regular Expression Training App, Nick V. Flor
Journal of Digital Forensics, Security and Law
Regular expressions enable digital forensic analysts to find information in files. The best way for an analyst to become proficient in writing regular expressions is to practice. This paper presents the code for an app that allows an analyst to practice writing regular expressions.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Automatic Crash Recovery: Internet Explorer's Black Box, John Moran, Douglas Orr
Automatic Crash Recovery: Internet Explorer's Black Box, John Moran, Douglas Orr
Journal of Digital Forensics, Security and Law
A good portion of today's investigations include, at least in part, an examination of the user's web history. Although it has lost ground over the past several years, Microsoft's Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of …
Pandora’S Email Box? An Exploratory Study Of Web-Based Email Forgery Detection And Validation., Richard Boddington, Grant Boxall, Jeremy Ardley
Pandora’S Email Box? An Exploratory Study Of Web-Based Email Forgery Detection And Validation., Richard Boddington, Grant Boxall, Jeremy Ardley
Journal of Digital Forensics, Security and Law
Web based email systems may be a source of pristine digital evidence because of the perceived difficulty of client tampering with messages stored inside the email account. We demonstrate that such assumption is wrong in the case of Windows Live Hotmail®1 . Windows Live Mail®1 synchronises message on client-side computers with the Hotmail® server, benefiting users wishing to synchronise their email accounts and personal devices. However, this synchronisation opens an exploit for wrongdoers to tamper with existing email messages and attachments as well as facilitating the insertion of fabricated messages. The exploit process enables persistent storage of tampered and fabricated …