Challenges to Digital Forensic Evidence

被引:0
|
作者
Kessler, Gary C. [1 ]
机构
[1] Champlain Coll, Burlington, VT 05401 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:57 / 59
页数:3
相关论文
共 50 条
  • [31] Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet
    Clive Walker
    [J]. Crime Prevention and Community Safety, 2001, 3 (1): : 87 - 88
  • [32] Digital Forensic Evidence Collection of Cloud Storage Data for Investigation
    Easwaramoorthy, Sathishkumar
    Thamburasa, Sankar
    Samy, Guru
    Bhushan, S. Bharath
    Aravind, Karrothu
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2016,
  • [33] Digital Forensic Evidence Examination, 2nd ed
    Kessler, Gary C.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2010, 5 (02) : 85 - 89
  • [34] FIA: An Open Forensic Integration Architecture for Composing Digital Evidence
    Raghavan, Sriram
    Clark, Andrew
    Mohay, George
    [J]. FORENSICS IN TELECOMMUNICATIONS, INFORMATION AND MULTIMEDIA, 2009, 8 : 83 - 94
  • [35] Digital forensic evidence-Flaws in the criminal justice system
    Collie, Jan
    [J]. FORENSIC SCIENCE INTERNATIONAL, 2018, 289 : 154 - 155
  • [36] Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence
    Hales, Gavin
    Bayne, Ethan
    [J]. HCI FOR CYBERSECURITY, PRIVACY AND TRUST, 2019, 11594 : 277 - 293
  • [37] A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence
    Yen, Yun-Sheng
    Lin, I-Long
    Wu, Bo-Lin
    [J]. DIGITAL INVESTIGATION, 2011, 8 (01) : 56 - 67
  • [38] A forensic framework to improve digital image evidence administration in IIoT
    Rani, Deepti
    Gill, Nasib Singh
    Gulia, Preeti
    [J]. JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2024, 38
  • [39] A system for the proactive, continuous, and efficient collection of digital forensic evidence
    Shields, Clay
    Frieder, Ophir
    Maloof, Mark
    [J]. DIGITAL INVESTIGATION, 2011, 8 : S3 - S13
  • [40] Study on Constructing Malware Attack Forensic Procedure of Digital Evidence
    Chang, Chih-Pai
    Chen, Chun-Te
    Lu, Tsung-Hui
    Lin, I-Long
    Chang, Jesse
    Lin, Chen-Cheng
    [J]. IEEE INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE 2013), 2013, : 401 - 406