Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,807,371 papers from all fields of science
Search
Sign In
Create Free Account
Computer forensics
Known as:
Cross-drive analysis
, Cyber forensics
, Digital triage forensics
Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Anomaly detection
Anti-computer forensics
Attrition (website)
Certified Forensic Computer Examiner
Expand
Broader (1)
Information technology audit
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Design and Implementation of a forensic framework for Cloud in OpenStack cloud platform
S. Saibharath
,
G. Geethakumari
International Conference on Advances in Computing…
2014
Corpus ID: 10082196
In this paper, a forensic framework has been developed to do cloud forensics in OpenStack for infrastructure as a service model…
Expand
2012
2012
Novel Anti-forensics Approaches for Smart Phones
S. Azadegan
,
Wei Yu
,
Hui Liu
,
Ali Sistani
,
Subrata Acharya
Hawaii International Conference on System…
2012
Corpus ID: 21842868
Anti-forensics is defined as a method undertaken to thwart the digital investigation process conducted by forensic investigators…
Expand
2012
2012
Utilizing data lifetime of TCP buffers in digital forensics: Empirical study
Mohammed I. Al-Saleh
,
Ziad Al-Sharif
Digital Investigation. The International Journal…
2012
Corpus ID: 1991539
2011
2011
Comprar Forensic Recovery Of Human Remains: Archaeological Approaches | Tosha L. Dupras | 9781439850305 | CRC PRESS
T. Dupras
,
Jhon J. Schultz
,
Sandra M. Wheeler
,
L. Williams
2011
Corpus ID: 192843355
Tienda online donde Comprar Forensic Recovery Of Human Remains: Archaeological Approaches al precio 87,24 € de Tosha L. Dupras…
Expand
2010
2010
BBox: A Distributed Secure Log Architecture
R. Accorsi
European Public Key Infrastructure Workshop
2010
Corpus ID: 17316274
This paper presents BBox, a digital black box to provide for authentic archiving in distributed systems. Based upon public key…
Expand
2007
2007
Insider Threat Analysis Using Information-Centric Modeling
Duc T. Ha
,
S. Upadhyaya
,
H. Ngo
,
S. Pramanik
,
R. Chinchani
,
Sunu Mathew
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 1194422
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system…
Expand
2004
2004
Writer Identification Method Based on Forensic Knowledge
M. Tapiador
,
J. A. Sigüenza
International Conference on Biometric…
2004
Corpus ID: 37271476
Police corps have been extensively used Forensic techniques to perform criminal identification. One of these techniques is…
Expand
Highly Cited
2002
Highly Cited
2002
Scene of the cybercrime : computer forensics handbook
D. Shinder
,
Ed Tittel
2002
Corpus ID: 108866364
Chapter 1: Introduction Chapter 2: The Rise of Cybercrime Chapter 3: Understanding the Cybercriminal Mindset Chapter 4…
Expand
1999
1999
Automatic speaker recognition using Gaussian mixture models
William J. J. Roberts
,
Jonathan P. Willmore
Information, Decision and Control. Data and…
1999
Corpus ID: 62339025
We describe the automatic identification of speakers from their voices. This process has an application in forensics and in voice…
Expand
Highly Cited
1991
Highly Cited
1991
Forensic Applications of Mass Spectrometry
J. Yinon
1991
Corpus ID: 97411383
GC/MS Analysis of Body Fluids for Drugs of Abuse (J. Cody and R.L. Foltz). Forensic Drug Testing by Mass Spectrometric Analysis…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE