Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,059,118 papers from all fields of science
Search
Sign In
Create Free Account
Computer forensics
Known as:
Cross-drive analysis
, Cyber forensics
, Digital triage forensics
Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Anomaly detection
Anti-computer forensics
Attrition (website)
Certified Forensic Computer Examiner
Expand
Broader (1)
Information technology audit
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Forensic Uses of Clinical Assessment Instruments
2013
Corpus ID: 142970484
Archer, Stredny, Wheeler, Introduction to Forensic Uses of Clinical Assessment Instruments. Sellbom, Anderson, The Minnesota…
Expand
2012
2012
A Case Study on Digital Forensics in the Cloud
F. Marturana
,
G. Me
,
S. Tacconi
International Conference on Cyber-Enabled…
2012
Corpus ID: 11183271
Cloud computing and cloud forensics are probably the two most popular and debated IT topics in recent years, implying relevant…
Expand
2012
2012
Novel Anti-forensics Approaches for Smart Phones
S. Azadegan
,
Wei Yu
,
Hui Liu
,
Ali Sistani
,
Subrata Acharya
Hawaii International Conference on System…
2012
Corpus ID: 21842868
Anti-forensics is defined as a method undertaken to thwart the digital investigation process conducted by forensic investigators…
Expand
2010
2010
An efficient method for partial fingerprint recognition based on local binary pattern
S. Malathi
,
C. Meena
INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL…
2010
Corpus ID: 16663030
Matching of partial fingerprints has important applications in both biometrics and forensics. It is well-known that the accuracy…
Expand
Highly Cited
2009
Highly Cited
2009
A secure and improved self-embedding algorithm to combat digital document forgery
A. Cheddad
,
J. Condell
,
K. Curran
,
P. Kevitt
Signal Processing
2009
Corpus ID: 13838044
Highly Cited
2008
Highly Cited
2008
Using JPEG quantization tables to identify imagery processed by software
Jesse D. Kornblum
Digital Investigation. The International Journal…
2008
Corpus ID: 8311947
Highly Cited
2003
Highly Cited
2003
Incident Response & Computer Forensics, 2nd Ed.
Chris Prosise
,
K. Mandia
,
M. Pepe
2003
Corpus ID: 59885072
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident…
Expand
Highly Cited
2002
Highly Cited
2002
Scene of the cybercrime : computer forensics handbook
D. Shinder
,
Ed Tittel
2002
Corpus ID: 108866364
Chapter 1: Introduction Chapter 2: The Rise of Cybercrime Chapter 3: Understanding the Cybercriminal Mindset Chapter 4…
Expand
1999
1999
Automatic speaker recognition using Gaussian mixture models
William J. J. Roberts
,
Jonathan P. Willmore
Information, Decision and Control. Data and…
1999
Corpus ID: 62339025
We describe the automatic identification of speakers from their voices. This process has an application in forensics and in voice…
Expand
Highly Cited
1991
Highly Cited
1991
Forensic Applications of Mass Spectrometry
J. Yinon
1991
Corpus ID: 97411383
GC/MS Analysis of Body Fluids for Drugs of Abuse (J. Cody and R.L. Foltz). Forensic Drug Testing by Mass Spectrometric Analysis…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE