Skip to main content
This document contain a simple example of an expert witness digital forensics report
    • by 
    •   23  
      Critical TheoryCriminologyCriminal LawCriminal Justice
Mobile phone proliferation in our societies is on the increase. Advances in semiconductor technologies related to mobile phones and the increase of computing power of mobile phones led to an increase of functionality of mobile phones... more
    • by 
    •   6  
      Computer ForensicsDigital ForensicsDigital Investigation,Computer Forensics, Computer securityMobile Forensics
The Basics of Digital Forensics
    • by 
    • Digital Forensics
Russian hybrid warfare has become the principle threat to NATO over the last decade. From the Baltic Sea to the Black Sea, Russia has exercised its will across Europe; inciting tensions while limiting its activities to below the Article 5... more
    • by 
    •   9  
      Cyber crimeDigital ForensicsCyber SecurityNATO-Russian Relations
The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for... more
    • by  and +1
    •   3  
      CybercrimesCybersecurityDigital Forensics
Smart phones are one of the most troublesome technologies that exist today and steadily gaining popularity with better connectivity, functionality and productivity. The ever-increasing complexity of these smart phones gives a new level of... more
    • by 
    •   4  
      Information SecurityComputer ForensicsDigital ForensicsMobile Forensics
This study discusses how to build an automatic fish feeder machine based on microcontroller AT89S52. Machine or the tool will be able to work automatically according to the schedule specified by the user. So it will be very flexible which... more
    • by 
    •   7  
      TechnologyNetwork SecurityComputer NetworksMicrocontrollers
The massacre of the protesters and the police during the “Euromaidan” mass protests on February 18-20, 2014 in Ukraine contributed to the overthrow of the Ukrainian government and ultimately to a start of the civil war in Donbas, Russian... more
    • by 
    •   100  
      CriminologyPolitical SociologyArea StudiesEastern European Studies
Establishing the age at which prehistoric individuals move away from their childhood residential location holds crucial information about the socio dynamics and mobility patterns in ancient societies. We present a novel combination of... more
    • by  and +3
    •   44  
      ArchaeologyPrehistoric ArchaeologyForensicsForensic Anthropology
Propuesta de Política Pública para la Protección de los Sistemas de la Información como Activos Estratégicos de las Instituciones.
    • by 
    •   4  
      Digital ForensicsDigital Forensic, Cyber Crime, Cyber SecurityCibersecurityCiberseguridad
Crimes committed within electronic or digital domains, particularly within cyberspace, have become extremely common these days. Criminals are using technology to a great extent in committing various digital offences and creating new... more
    • by 
    •   6  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer securityDigital Forensic, Cyber Crime, Cyber SecurityE-discovery
    • by 
    •   7  
      Computer ForensicsCybercrimesDigital ForensicsDigital Investigation,Computer Forensics, Computer security
    • by 
    •   6  
      E-learningVirtual EnvironmentsCybersecurityDigital Forensics
The First World War is still widely regarded as a recent event. However, with the passing of the last survivors, History is becoming the domain of Archaeology. These archaeological finds give a clear insight into global politics and... more
    • by  and +2
    •   375  
      HistoryAmerican HistoryEuropean HistoryHistory of Science and Technology
Perubahan dunia akibat penggunaan gadget/barang elektronik yang tiap hari terus berkembang membawa dampak dimana manusia seakan hidup di dunia virtual yang segalanya bisa dilakukan menggunakan barang-barang elektronik tersebut. Dunia... more
    • by 
    •   2  
      Computer ForensicsDigital Forensics
In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online transactions, and also negatively by criminals... more
    • by  and +1
    •   6  
      Forensic PsychologyForensicsComputer ForensicsForensic Science
    • by 
    •   5  
      Computer ForensicsDigital ForensicsDigital Investigation,Computer Forensics, Computer securityAll areas of Informatics, Educational technologies, Cyber Security & Forensics, Cyber Audit, ICT
    • by 
    • Digital Forensics
The integration of strong encryption into operating systems is creating challenges for forensic examiners, potentially preventing us from recovering any digital evidence from a computer. Because strong encryption cannot be circumvented... more
    • by 
    •   5  
      Operating SystemsComputer ForensicsOPERATING SYSTEMDigital Forensics
Este artigo apresenta os impactos da realidade digital no acesso à informação e avalia a interoperabilidade da informação arquivística e os padrões que visam estruturá-la. Analisa a padronização da informação originada pela estrutura... more
    • by 
    •   7  
      Digital ForensicsCIÊNCIA DA INFORMAÇÃOArquivologiaArquivos digitais
The development of systems capable of recognizing and categorising emotions is of interest to researchers in various scientific areas including artificial intelligence. The traditional notion that emotions and rationality are two separate... more
    • by  and +1
    •   73  
      Instrumentation EngineeringBioinformaticsPhysiologyHuman Physiology
The impact of forensic evidence found on smartphones cannot be overemphasized when compared to that found on their digital counterparts such as personal computers (PCs). Recently, third-party instant messaging applications have gradually... more
    • by  and +1
    •   5  
      Computer ForensicsForensic ScienceDigital ForensicsCyber Security
The Internet of Things (IoT), a metaphor for smart, functional Cyberphysical Environments (CPE) is finding some usefulness in various sectors including healthcare, security, transportation and the Smart Home (SH). Within the IoT, objects... more
    • by 
    •   8  
      The Internet of ThingsInternet of ThingsDigital ForensicsDigital Investigation,Computer Forensics, Computer security
Dentro del proceso investigativo en delitos cibernéticos, todos los hallazgos encontrados vienen hacer parte fundamental de la investigación, los mismos que son tratados en el "Computer Crime Scene" como evidencia; la identificación,... more
    • by 
    •   6  
      Computer ForensicsCybercrimesDigital ForensicsCyber Forensics
ABSTRAK Anti Forensik merupakan suatu bagian kajian di bidang Teknologi Informasi yang bertujuan untuk mengamankan data digital yang bersifat rahasia, agar tidak ditemukan oleh ahli komputer forensik (investigator) pada saat proses... more
    • by  and +1
    •   6  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer securityCyber Forensics
Digital forensics is an important and growing forensic domain. Research on miscarriages of justice and misleading evidence, as well as various inquires in the UK and the US, have highlighted human error as an issue within forensic... more
    • by 
    •   8  
      ForensicsComputer ForensicsForensic ScienceDecision Making
    • by 
    •   5  
      CybercrimesMalwareDigital ForensicsZeus
This study analyses the use and development of Digital Forensic case studies for the purpose of teaching and assessing Digital Forensics students and practitioners. Within this study, case studies are categorised and a number of available... more
    • by 
    •   3  
      Computer ScienceDigital ForensicsCyber Security
Data mining in databases is part of the interdisciplinary field of knowledge discovery used for extracting patterns and relationships amongst the data sets from a data source. This paper focuses on mining data from a database. The study... more
    • by  and +2
    •   4  
      Computer ScienceData MiningDigital ForensicsData Recovery
Secure communication is a necessity that must be considered in any smart application to guarantee the confidentiality of information. Recently, ZigBee has been utilized in different smart applications such as automatic metering, power... more
    • by 
    •   3  
      Digital ForensicsZigbee NetworksCyber Security
Digital forensics will always include at least human as the one who performs activities, digital evidence as the main object, and process as a reference for the activities followed. The existing framework has not provided a description of... more
    • by  and +1
    •   3  
      CybercrimesDigital ForensicsDigital Evidence
The extraordinary development of mobile communications is a source of new security challenges. Today, mobile phones have become ubiquitous in nature involving their use in many daily activities, and sometimes those activities might be... more
    • by 
    •   11  
      Computer ForensicsForensic ScienceMobile TechnologyDigital Preservation
Portable web browsers are installed on removable storage devices which can be taken by a user from computer to computer. One of the claimed benefits of portable web browsers is enhanced privacy, through minimization of the traces of... more
    • by 
    •   5  
      Web 2.0PrivacyDigital ForensicsTalal Al Ismail
Today's huge volumes of data, heterogeneous information and communication technologies, and borderless cyberinfrastructures create new challenges for security experts and law enforcement agencies investigating cybercrimes. The future of... more
    • by  and +1
    •   4  
      Computer ForensicsSteganographyDigital ForensicsCyber Security
I was recently asked to conduct research on the development of digital forensics with regard admissibility of evidence in a court of law. Digital forensics is a dynamic field growing at a fast pace. As such there's is need for laws and... more
    • by 
    •   4  
      Law of evidenceDigital ForensicsMobile Device ForensicsAdmissibility of Digital Evidence
—The field of digital forensic analysis has emerged in the past two decades to counter the digital crimes and investigate the modus operandi of the culprits to secure the computer systems. With the advances in technologies and pervasive... more
    • by 
    • Digital Forensics
Computer scientists have been slow to become aware of the importance of emotion on human decisions and actions. Recently, however, a considerable amount of research has focused on the utilisation of affective information with the... more
    • by  and +1
    •   52  
      Psychological AssessmentForensic PsychologyArtificial IntelligenceMedical Sciences
Digital evidence is becoming an integral part of most cases presented to court. From computers, to mobile phones, ATMs and surveillance cameras, our daily life is so inextricably entwined with technology that it is difficult to find court... more
    • by 
    •   4  
      Computer ScienceInformation TechnologyDigital ForensicsSouth Africa
Seiring dengan perkembangan teknologi internet, menyebabkan munculnya kejahatan yang disebut “CyberCrime” atau kejahatan melalui jaringan internet. Munculnya beberapa kasus “CyberCrime” di Indonesia, seperti pencurian kartu kresit,... more
    • by 
    •   4  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer securityHukumBukti Digital
The paper explores the application of digital forensics techniques to cyber warfare scenarios. A common accepted taxonomy for digital forensics (and anti- forensics) activities, techniques, procedures and work flows does not yet exist... more
    • by 
    •   4  
      Cyber ConflictCyber WarfareCyberwarfareDigital Forensics
—This paper highlights the challenges faced due to non-availability of trusted specialized forensic tools for conducting investigation on gaming consoles. We have developed a framework to examine existing state-of-the-art forensic... more
    • by 
    •   3  
      Video GamesDigital ForensicsCyber Security
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally... more
    • by 
    •   5  
      Expert SystemsComputer ForensicsDigital ForensicsCyber Security
Dalam buku ini pembahasan pertama kali yaitu tentang pengenalan forensik secara umum dan mengetahui jenis-jenis forensik. Setelah pengenalan forensik secara umum, pembaca selanjutnya akan mengetahui apa itu forensika digital dan... more
    • by 
    • Digital Forensics
    • by 
    •   3  
      Intelligence StudiesIntelligenceDigital Forensics
Standards and certifications. Certifications are a good way to develop investigators' skills. This has is already successfully applied in other computer fields, such as computer security . A small number of certifications -such as the... more
    • by 
    • Digital Forensics
Menjamurnya barang-barang elektronik seperti handphone, komputer, tablet, flashdisk dan lain-lain semakin hari kian merata pada kalangan masyarakat, hampir semua lapisan masyarajat memiliki perangkat elektronik untuk mempermudah... more
    • by 
    • Digital Forensics
Wireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are, however, faced with some serious security challenges and the choice of security protocol is a critical issue... more
    • by 
    •   10  
      Network SecurityWireless securityComputer SecurityDigital Forensics
Organised crime, as well as individual criminals, is benefiting from the protection of private browsers provide to those who would carry out illegal activity, such as money laundering, drug trafficking, the online exchange of child-abuse... more
    • by 
    •   3  
      Computer ForensicsDigital ForensicsCybercrime
This thesis focuses on the development, implementation and optimization of pattern-matching algorithms in two different, yet closely-related research fields: malicious code detection in intrusion detection systems and digital forensics... more
    • by 
    •   13  
      Artificial IntelligenceGPU ComputingIntrusion Detection SystemsGPGPU (General Purpose GPU) Programming
Substantial progress has been achieved in voice-based biometrics in recent times but a variety of challenges still remain for speech research community. One such obstacle is reliable speaker authentication from speech signals degraded by... more
    • by  and +1
    •   34  
      Telecommunications EngineeringComputer ScienceHuman Computer InteractionForensics