Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,976,981 papers from all fields of science
Search
Sign In
Create Free Account
Computer forensics
Known as:
Cross-drive analysis
, Cyber forensics
, Digital triage forensics
Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Anomaly detection
Anti-computer forensics
Attrition (website)
Certified Forensic Computer Examiner
Expand
Broader (1)
Information technology audit
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Evolutionary Approaches for Automatic 3D Modeling of Skulls in Forensic Identification
J. Santamaría
,
O. Cordón
,
S. Damas
EvoWorkshops
2009
Corpus ID: 14212730
Photographic supra-projection is a complex and uncertain process that aims at identifying a person by overlaying a photograph and…
Expand
2008
2008
Live Forensic Acquisition as Alternative to Traditional Forensic Process
M. Lessing
International Conference on IT-Incidents…
2008
Corpus ID: 15961761
IT Incident Management & IT Forensics (IMF 2008), Mannheim, Germany, 23 - 25 September 2008
2007
2007
Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers
Michael Sheetz
2007
Corpus ID: 60391172
Introduction. Acknowledgments. 1 A Definition of Computer Forensics. Introduction. Forensic Science. History of Computer…
Expand
2007
2007
Deriving cse-specific live forensics investigation procedures from FORZA
R. Ieong
,
H. C. Leung
ACM Symposium on Applied Computing
2007
Corpus ID: 13097044
Performing live forensics investigation becomes a trend in digital forensics. Different vendors and software developer implement…
Expand
2005
2005
The Portable Guide to Testifying in Court for Mental Health Professionals: An A-Z Guide to Being an Effective Witness
B. Bernstein
,
Thomas L. Hartsell
2005
Corpus ID: 68964577
PART I: THE JUDICIAL SYSTEM. 1. Our System of Justice. 2. Involvement in the Judicial System. 3. Lawyers: Their Functions. 4. The…
Expand
2005
2005
Study on Relevant Law and Technology Issues about Computer Forensics
Liren Ding
,
Y. Wang
2005
Corpus ID: 58450301
Researchers of law investigate the relevant law features and identification of computer evidences, while computer scientists…
Expand
2005
2005
Digital watermarks for audio integrity verification
Rade PetrovicI
International Conference on Telecommunication in…
2005
Corpus ID: 13463866
This paper proposes a new method of detecting and locating manipulations of audio recordings, such as cuts, inserts, replacements…
Expand
2002
2002
Assessing Forensics in the 21st Century: Ten Questions Individual Events Programs Must Address
A. Billings
2002
Corpus ID: 107863163
Weatherable thermoplastic polymeric compositions are formed by blending weatherable grafted rubber composition with an aliphatic…
Expand
2000
2000
Computer Forensics Today
Kelly J. Kuchta
Information Security Journal
2000
Corpus ID: 37522214
Abstract When people hear the word “forensics,” it often generates a mental image of the movie series with Jack Klugman as a…
Expand
1999
1999
Automatic speaker recognition using Gaussian mixture models
W. Roberts
,
Jonathan P. Willmore
Information, Decision and Control. Data and…
1999
Corpus ID: 62339025
We describe the automatic identification of speakers from their voices. This process has an application in forensics and in voice…
Expand