Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,065,854 papers from all fields of science
Search
Sign In
Create Free Account
Computer forensics
Known as:
Cross-drive analysis
, Cyber forensics
, Digital triage forensics
Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Anomaly detection
Anti-computer forensics
Attrition (website)
Certified Forensic Computer Examiner
Expand
Broader (1)
Information technology audit
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Bots and Gender Identification Based on Stylometry of Tweet Minimal Structure and n-grams Model
Alex I. Valencia-Valencia
,
Helena Gómez-Adorno
,
Christophe Rhodes
,
Gibran Fuentes Pineda
Conference and Labs of the Evaluation Forum
2019
Corpus ID: 198489670
Social media bots pose as humans to influence users with commercial, political or ideological purposes with the aim of…
Expand
2014
2014
Design and Implementation of a forensic framework for Cloud in OpenStack cloud platform
S. Saibharath
,
G. Geethakumari
International Conference on Advances in Computing…
2014
Corpus ID: 10082196
In this paper, a forensic framework has been developed to do cloud forensics in OpenStack for infrastructure as a service model…
Expand
2012
2012
Utilizing data lifetime of TCP buffers in digital forensics: Empirical study
Mohammed I. Al-Saleh
,
Ziad Al-Sharif
Digital Investigation. The International Journal…
2012
Corpus ID: 1991539
2010
2010
BBox: A Distributed Secure Log Architecture
R. Accorsi
European Public Key Infrastructure Workshop
2010
Corpus ID: 17316274
This paper presents BBox, a digital black box to provide for authentic archiving in distributed systems. Based upon public key…
Expand
2007
2007
Insider Threat Analysis Using Information-Centric Modeling
Duc T. Ha
,
S. Upadhyaya
,
H. Ngo
,
S. Pramanik
,
R. Chinchani
,
Sunu Mathew
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 1194422
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system…
Expand
2004
2004
Writer Identification Method Based on Forensic Knowledge
M. Tapiador
,
J. A. Sigüenza
International Conference on Biometric…
2004
Corpus ID: 37271476
Police corps have been extensively used Forensic techniques to perform criminal identification. One of these techniques is…
Expand
2004
2004
Forensic identification of a murderer by LCN DNA collected from the inside of the victim's car
M. Pizzamiglio
,
A. Mameli
,
D. My
,
L. Garofano
2004
Corpus ID: 92983992
Highly Cited
2002
Highly Cited
2002
Scene of the cybercrime : computer forensics handbook
D. Shinder
,
Ed Tittel
2002
Corpus ID: 108866364
Chapter 1: Introduction Chapter 2: The Rise of Cybercrime Chapter 3: Understanding the Cybercriminal Mindset Chapter 4…
Expand
1999
1999
Automatic speaker recognition using Gaussian mixture models
William J. J. Roberts
,
Jonathan P. Willmore
Information, Decision and Control. Data and…
1999
Corpus ID: 62339025
We describe the automatic identification of speakers from their voices. This process has an application in forensics and in voice…
Expand
Highly Cited
1991
Highly Cited
1991
Forensic Applications of Mass Spectrometry
J. Yinon
1991
Corpus ID: 97411383
GC/MS Analysis of Body Fluids for Drugs of Abuse (J. Cody and R.L. Foltz). Forensic Drug Testing by Mass Spectrometric Analysis…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE