• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 15
Next 10 →

Best Practices for Cybercrime Evidence Collection Projects

by Lilian Noronha Nassif
"... One important phase related to a cybercrime investigation is evidence collection. If the investigator lacks a standard, robust approach to properly conduct crime scene research, some important information can be lost, and judges can discard case evidence because the acquisition process was faulty. I ..."
Abstract - Add to MetaCart
digital investigator should follow in the initiation, planning, execution, controlling, and closing phases of the evidence collection. All mechanisms can contribute to a best practices guide in the forensics field.

Multi-Perspective Cybercrime Investigation Process Modeling

by Atsa Etoundi Roger, Mboupda Moyo Achille
"... Several works have been carried out in the domain of cybercrime investigation. Each of the resulting models is based on a set of activities that should be performed in order to obtain the required evidences that are needed in the court for prosecution. In the literature, three processes have been hi ..."
Abstract - Add to MetaCart
Several works have been carried out in the domain of cybercrime investigation. Each of the resulting models is based on a set of activities that should be performed in order to obtain the required evidences that are needed in the court for prosecution. In the literature, three processes have been

Anti-Forensics: A Practitioner Perspective

by Richard De Beer, Adrie St, Jean-paul Van Belle
"... With the increase in cybercrime, digital evidence is becoming an integral part of the judicial system. Digital evidence is to be found everywhere from computers, to mobile phones, ATMs and surveillance cameras, and it is hard to imagine a crime that does not contain any element of digital evidence. ..."
Abstract - Add to MetaCart
With the increase in cybercrime, digital evidence is becoming an integral part of the judicial system. Digital evidence is to be found everywhere from computers, to mobile phones, ATMs and surveillance cameras, and it is hard to imagine a crime that does not contain any element of digital evidence

Redeye: A Digital Library for Forensic Document Triage

by Paul Logasa, Bogen Ii, Amber Mckenzie, Rob Gillen
"... Forensic document analysis has become an important aspect of investigation of many different kinds of crimes from money laundering to fraud and from cybercrime to smuggling. The current workflow for analysts includes powerful tools, such as Palantir and Analyst’s Notebook, for moving from evidence t ..."
Abstract - Add to MetaCart
Forensic document analysis has become an important aspect of investigation of many different kinds of crimes from money laundering to fraud and from cybercrime to smuggling. The current workflow for analysts includes powerful tools, such as Palantir and Analyst’s Notebook, for moving from evidence

The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks

by Sipho Ngobeni, Hein Venter
"... Abstract: Over the past decade, wireless mobile communication technology based on the IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cybercrime. WLAN digital forensics is s ..."
Abstract - Add to MetaCart
it be necessary to conduct a digital forensic investigation. The availability of this digital information can maximise the chances of using it as digital evidence and it reduces the cost of conducting the entire digital forensic investigation process.

Abstract Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework

by Gong Ruibin, Chan Kai Yun, Mathias Gaertner
"... Computer Forensics has grown rapidly in recent years. The current computer forensic investigation paradigm is laborious and requires significant expertise on the part of the investigators. This paper proposes a highly automatic and efficient framework to provide the Case-Relevance information, by bi ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
, by binding computer intelligence technology to the current computer forensic framework. Computer intelligence is expected to offer more assistance in the investigation procedures and better knowledge reuse and sharing in computer forensics. Background Cybercrime is a mirror of the dark side of human society

A Crime Depended Automated Search and Engine for Digital Forensics

by J. P. Fizaine, N. L. Clarke
"... As the number of cybercrime is rising up, time and accuracy in digital forensic become more complex to handle. This phenomena is due to the large amount of data to be investigate hence requires more time to analyse. In the meantime the technology is more and more complex and it more skills are neces ..."
Abstract - Add to MetaCart
As the number of cybercrime is rising up, time and accuracy in digital forensic become more complex to handle. This phenomena is due to the large amount of data to be investigate hence requires more time to analyse. In the meantime the technology is more and more complex and it more skills

Data Mining based Crime-Dependent Triage in Digital Forensics Analysis

by Rosamaria Bertè, Fabio Marturana, Gianluigi Me, Simone Tacconi
"... Abstract. Over the last few years, law enforcement registered a growing number of crimes related to the worldwide diffusion of high storage capacity low-cost digital devices. As a consequence Computer Forensics, the investigative discipline that aims to find evidence among seized devices is becoming ..."
Abstract - Add to MetaCart
Abstract. Over the last few years, law enforcement registered a growing number of crimes related to the worldwide diffusion of high storage capacity low-cost digital devices. As a consequence Computer Forensics, the investigative discipline that aims to find evidence among seized devices

1 Digital Chain of Custody: State of the Art

by Yudi Prayudi, Azhari Sn
"... Digital forensics starts to show its role and contribution in the society as a solution in disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an attempt to preserve the integrity of digital evidence as well as a procedure for performing documentation chronolog ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Digital forensics starts to show its role and contribution in the society as a solution in disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an attempt to preserve the integrity of digital evidence as well as a procedure for performing documentation

The ‘Inverse CSI Effect’: Evidence from e-Crime Data

by Richard E Overill - in Issues in Cybercrime, Security and Digital Forensics, Proc. 2 nd International Conference on Cybercrime, Security and Digital Forensics (eds. GRS Weir & A Al-Nemrat
"... Abstract. Analysis of trends mined from recent computer crime survey data has yielded circumstantial evidence in support of the previously proposed concept of the “Inverse CSI Effect”, operating in the cyber-crime domain. The implications of this finding for digital forensics investigations are brie ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract. Analysis of trends mined from recent computer crime survey data has yielded circumstantial evidence in support of the previously proposed concept of the “Inverse CSI Effect”, operating in the cyber-crime domain. The implications of this finding for digital forensics investigations
Next 10 →
Results 1 - 10 of 15
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University