Computer forensics

Known as: Cross-drive analysis, Cyber forensics, Digital triage forensics 
Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Progress in computer forensics research has been limited by the lack of a standardized data setsdcorporadthat are available for… (More)
Is this relevant?
2009
2009
The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2009
2009
To be able to examine large amounts of data in a timely manner in search of important evidence during crime investigations is… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Computer Forensics is mainly about investigating crime where computers have been involved. There are many tools available to aid… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible… (More)
Is this relevant?
2007
2007
Steganography deals with secrecy and convert communication and today the techniques for countering this in the context of… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 6
Is this relevant?
Highly Cited
2006
Highly Cited
2006
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In many real-world applications, sensitive information must be kept it log files on an untrusted machine. In the event that an… (More)
  • figure 1
Is this relevant?
1998
1998
This course will teach attendees how to respond correctly to a potential forensics investigation in order to maximise the amount… (More)
Is this relevant?