Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Computer forensics

Known as: Cross-drive analysis, Cyber forensics, Digital triage forensics 
Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Cloud data provenance is metadata that records the history of the creation and operations performed on a cloud data object… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Cloud computing is a relatively new concept that offers the potential to deliver scalable elastic services to many. The notion of… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Today's Golden Age of computer forensics is quickly coming to an end. Without a clear strategy for enabling research efforts that… Expand
  • figure 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Progress in computer forensics research has been limited by the lack of a standardized data sets-corpora-that are available for… Expand
  • table 1
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Computer Forensics is mainly about investigating crime where computers have been involved. There are many tools available to aid… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
  • M. Rogers
  • Comput. Secur.
  • 2003
  • Corpus ID: 28543559
In today's increasingly complex world, we find ourselves at a rather unique societal and cultural cross roads. At no other time… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Preface. Acknowledgments. 1. Introduction to Computer Forensics. 2. Tracking an Offender. 3. The Basics of Hard Drives and… Expand
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In many real-world applications, sensitive information must be kept it log files on an untrusted machine. In the event that an… Expand
  • figure 1
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?