Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,046,134 papers from all fields of science
Search
Sign In
Create Free Account
Computer forensics
Known as:
Cross-drive analysis
, Cyber forensics
, Digital triage forensics
Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Anomaly detection
Anti-computer forensics
Attrition (website)
Certified Forensic Computer Examiner
Expand
Broader (1)
Information technology audit
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A digital forensic model for introspection of virtual machines in cloud computing
B. K. S. P. Kumar Alluri
,
G. Geethakumari
IEEE International Conference on Signal…
2015
Corpus ID: 32923153
Performing digital forensics in cloud can add a new dimension to the process of building trust in cloud. But the very…
Expand
2014
2014
Design and Implementation of a forensic framework for Cloud in OpenStack cloud platform
S. Saibharath
,
G. Geethakumari
International Conference on Advances in Computing…
2014
Corpus ID: 10082196
In this paper, a forensic framework has been developed to do cloud forensics in OpenStack for infrastructure as a service model…
Expand
2012
2012
Novel Anti-forensics Approaches for Smart Phones
S. Azadegan
,
Wei Yu
,
Hui Liu
,
Ali Sistani
,
Subrata Acharya
Hawaii International Conference on System…
2012
Corpus ID: 21842868
Anti-forensics is defined as a method undertaken to thwart the digital investigation process conducted by forensic investigators…
Expand
2009
2009
An intelligent face features generation system from fingerprints
Ş. Sağiroğlu
,
Necla Özkaya
Turkish Journal of Electrical Engineering and…
2009
Corpus ID: 59825402
In this study, a novel intelligent system based on artificial neural networks was designed and introduced for generating faces…
Expand
2007
2007
Insider Threat Analysis Using Information-Centric Modeling
Duc T. Ha
,
S. Upadhyaya
,
H. Ngo
,
S. Pramanik
,
R. Chinchani
,
Sunu Mathew
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 1194422
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system…
Expand
2007
2007
Automated Windows event log forensics
Rich Murphey
Digital Investigation. The International Journal…
2007
Corpus ID: 14424013
2004
2004
Writer Identification Method Based on Forensic Knowledge
M. Tapiador
,
J. A. Sigüenza
International Conference on Biometric…
2004
Corpus ID: 37271476
Police corps have been extensively used Forensic techniques to perform criminal identification. One of these techniques is…
Expand
2004
2004
Forensic identification of a murderer by LCN DNA collected from the inside of the victim's car
M. Pizzamiglio
,
A. Mameli
,
D. My
,
L. Garofano
2004
Corpus ID: 92983992
2002
2002
Automated diagnosis for computer forensics
C. Elsaesser
,
M. Tanner
2002
Corpus ID: 14076992
Upon discovery, security administrators must determine how computer system intrusions were accomplished to prevent their…
Expand
1999
1999
Automatic speaker recognition using Gaussian mixture models
W. Roberts
,
Jonathan P. Willmore
Information, Decision and Control. Data and…
1999
Corpus ID: 62339025
We describe the automatic identification of speakers from their voices. This process has an application in forensics and in voice…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE