Forensic computing

被引:0
|
作者
Li, X [1 ]
Seberry, J [1 ]
机构
[1] Univ Wollongong, SITACS, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Technology is rapidly changing. the. speed and manner in which people interact with each other and with the world. As technology helps criminals to operate more easily and quickly across borders, so law enforcement capability-must continuously improve to keep one step ahead. Computer forensics has become a specialized and accepted investigative technique with its own tools and legal precedents that validate the discipline. Specially designed. forensic software is also widely used during the whole process of computer forensic investigation. This article introduces. computer forensic and computer evidence, introduces and compares some forensic software, and summarizes its likely future development.
引用
收藏
页码:18 / 35
页数:18
相关论文
共 50 条
  • [1] Challenges in forensic computing
    Mercuri, RT
    [J]. COMMUNICATIONS OF THE ACM, 2005, 48 (12) : 17 - 21
  • [2] The future of forensic computing
    Sheldon, Andrew
    [J]. DIGITAL INVESTIGATION, 2005, 2 (01) : 31 - 35
  • [3] Building a Forensic Computing Language
    Roussev, Vassil
    [J]. 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 5228 - 5233
  • [4] Cooperation forensic computing research
    Zhang, Youdong
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 25 - 30
  • [5] A Novel Forensic Computing Model
    XU Yunfeng~1
    2. College of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1865 - 1868
  • [6] The impact of forensic computing on telecommunications
    Patel, A
    Ciardhuáin, SO
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2000, 38 (11) : 64 - 67
  • [7] From IT forensics to forensic computing
    Freiling, Felix C.
    [J]. IT-INFORMATION TECHNOLOGY, 2015, 57 (06): : 337 - 338
  • [8] Trusted computing and forensic investigations
    Mason, S
    [J]. DIGITAL INVESTIGATION, 2005, 2 (03) : 189 - 192
  • [9] Enhancement of Forensic Computing Investigations through Memory Forensic Techniques
    Simon, Matthew
    Slay, Jill
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 995 - 1000
  • [10] Cloud Computing: Digital Forensic Solutions
    Morioka, Emi
    Sharbaf, Mehrdad S.
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 589 - 594