• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,407
Next 10 →

Forensic Analysis of Database Tampering

by Kyriacos Pavlou - in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD , 2006
"... Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions. This paper addresses the next problem, that of determining who, when, and what, by providing a systematic means of performing forensic analysis after such tampering has been uncovere ..."
Abstract - Cited by 40 (9 self) - Add to MetaCart
Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions. This paper addresses the next problem, that of determining who, when, and what, by providing a systematic means of performing forensic analysis after such tampering has been

Forensic Analysis of the Windows Registry

by Lih Wern Wong
"... Windows registry contains lots of information that are of potential evidential value or helpful in aiding forensic examiners on other aspects of forensic analysis. This paper discusses the basics of Windows XP registry and its structure, data hiding techniques in registry, and analysis on potential ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Windows registry contains lots of information that are of potential evidential value or helpful in aiding forensic examiners on other aspects of forensic analysis. This paper discusses the basics of Windows XP registry and its structure, data hiding techniques in registry, and analysis on potential

Mobile Phone Forensic Analysis

by Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy
"... Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone forensic analysis. T ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone forensic analysis

Towards models for forensic analysis

by Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo - In Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering , 2007
"... The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a model should possess. It presents an overview of a forensic model and an example of how to apply the model to a real-world, ..."
Abstract - Cited by 18 (10 self) - Add to MetaCart
-world, multi-stage attack. We show how using the model can result in forensic analysis requiring a much smaller amount of carefully selected, highly useful data than without the model. 1

Implementation of Forensic Analysis Procedures for

by Auqib Hamid Lone, Jamia Hamdrad, Firdoos Ahmad Badroo, Jamia Hamdrad, Khairaj Ram Chudhary, Aqeel Khalique, Jamia Hamdrad
"... Communication in today’s world is mostly dependent on mobile phones allowing users to exchange messages, ideas, videos and audios. Numerous instant messengers are available for mobile devices which are better alternative over SMS technology. However, increased use of instant messengers also gave ris ..."
Abstract - Add to MetaCart
rise to its negative impact including unwanted activities pertaining to cyber crimes. WhatsApp and Viber are mostly used instant messengers on Android mobile devices. In this paper, we perform forensic analysis procedures to obtain artifacts of WhatsApp and Viber applications. During analysis, we focus

Study on Forensic Analysis of Physical Memory

by Liming Cai, Jing Sha, Wei Qian
"... Abstract—In this paper we firstly describe the importance of the study on forensics analysis of physical memory. Further we introduce some tools and techniques commonly used in forensics analysis of physical memory. Lastly we present an example of forensic analysis to illustrate how to do physical m ..."
Abstract - Add to MetaCart
Abstract—In this paper we firstly describe the importance of the study on forensics analysis of physical memory. Further we introduce some tools and techniques commonly used in forensics analysis of physical memory. Lastly we present an example of forensic analysis to illustrate how to do physical

Principles-Driven Forensic Analysis

by Sean Peisert, Sidney Karin, Matt Bishop, Keith Marzullo - In Proceedings of the 2005 New Security Paradigms Workshop (NSPW , 2005
"... It is possible to enhance our understanding of what has hap-pened on a computer system by using forensic techniques that do not require prediction of the nature of the attack, the skill of the attacker, or the details of the system resources or objects affected. These techniques address five fundame ..."
Abstract - Cited by 19 (13 self) - Add to MetaCart
It is possible to enhance our understanding of what has hap-pened on a computer system by using forensic techniques that do not require prediction of the nature of the attack, the skill of the attacker, or the details of the system resources or objects affected. These techniques address five

Fingerprinting and Forensic Analysis of Multimedia

by Daniel Schonberg, Darko Kirovski - ACM MULTIMEDIA , 2004
"... One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a secure digital rights management (DRM) system on a general purpose computer. The difficulty ..."
Abstract - Cited by 14 (2 self) - Add to MetaCart
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a secure digital rights management (DRM) system on a general purpose computer. The difficulty

Forensic analysis of tampering database using RGBY algorithm

by Rajni Kori , Vinod Kumar Sripuram , Saurabh Suman , Dr B B Meshram
"... Abstract -We are using cryptographically-strong hash functions to detect tampering of a database to identify the people who have made any changes to the database silently we are applying forensic analysis algorithm and to determining who, when, and what, by providing a systematic means of performin ..."
Abstract - Add to MetaCart
Abstract -We are using cryptographically-strong hash functions to detect tampering of a database to identify the people who have made any changes to the database silently we are applying forensic analysis algorithm and to determining who, when, and what, by providing a systematic means

Foundations for Visual Forensic Analysis

by unknown authors
"... Abstract—Computer forensics is the preservation, analysis, and interpretation of computer data. It is a crucial tool in the arsenal of law enforcement investigators, national security analysts, and corporate computer emergency response teams. There is a need for software that aids investigators in l ..."
Abstract - Add to MetaCart
Abstract—Computer forensics is the preservation, analysis, and interpretation of computer data. It is a crucial tool in the arsenal of law enforcement investigators, national security analysts, and corporate computer emergency response teams. There is a need for software that aids investigators
Next 10 →
Results 1 - 10 of 2,407
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University