Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,884,399 papers from all fields of science
Search
Sign In
Create Free Account
EnCase
Known as:
EnCase Forensic
EnCase is the shared technology within a suite of digital investigations products by Guidance Software. The software comes in several products…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Application programming interface
Device configuration overlay
Disk image
Host protected area
Expand
Broader (3)
Computer forensics
Computer security
Incident management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Uncovering Limitations of E01 Self-Verifying Files
J. Krasniewicz
,
Sharon Cox
Advanced Methodologies and Technologies in System…
2019
Corpus ID: 65423133
In computer forensics, it is important to understand the purpose of evidence file formats to maintain continuity of acquired data…
Expand
2015
2015
Highly Stable and Efficient Hybrid Quantum Dot Light-Emitting Diodes
S. Hsu
,
Yin-Han Chen
,
+5 authors
C. Lin
IEEE Photonics Journal
2015
Corpus ID: 38373906
A highly efficient and reliable hybrid quantum dot (QD) light-emitting diode (LED) is demonstrated and analyzed. The CdTe…
Expand
2013
2013
Forensic Application-Fingerprinting Based on File System Metadata
S. Kalber
,
Andreas Dewald
,
F. Freiling
Seventh International Conference on IT Security…
2013
Corpus ID: 9378010
While much work has been invested in tools for aquisition and extraction of digital evidence, there are only few tools that allow…
Expand
2008
2008
Analysis and Design of A Mobile Forensic Software System Based on AT Commands
Zhicong Qian
,
Luo Delin
,
Shunxiang Wu
IEEE International Symposium on Knowledge…
2008
Corpus ID: 25213926
In this thesis, the types of data stored in the mobiles were first introduced. And then, AT commands are introduced. Finally, we…
Expand
2008
2008
Methods for Enhancement of Timestamp Evidence in Digital Investigations
Svein Yngvar Willassen
2008
Corpus ID: 42220382
This work explores how the evidential value of digital timestamps can be enhanced by taking a hypothesis based approach to the…
Expand
2006
2006
P2C-2 A New PVDF Membrane Hydrophone for Measurement of Medical Shock Waves
A. Maxwell
,
O. Sapozhnikov
,
M. Bailey
IEEE Ultrasonics Symposium
2006
Corpus ID: 23291063
Calibration of medical shock wave sources is critical and challenging. Aside from the fiber optic probe hydrophone, there are few…
Expand
2005
2005
Cultural Relativism in International War Crimes Prosecutions: The International Criminal Tribunal for Rwanda
Ida L. Bostian
2005
Corpus ID: 150537328
The tension between universalism and cultural relativism lies at the heart of war crimes and war crimes prosecutions. While…
Expand
2005
2005
The role of key loggers in computer-based assessment forensics
R. Laubscher
,
M. Olivier
,
H. Venter
,
J. Eloff
,
D. Rabe
2005
Corpus ID: 62449582
When conducting a computer-based assessment in an educational environment, several infringements of assessment regulations could…
Expand
2004
2004
An Investigation Into Computer Forensic Tools
K. Arthur
Information Security for South Africa
2004
Corpus ID: 10645507
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with…
Expand
2003
2003
Validation of SHRP asphalt mixture specifications using accelerated testing: final report
J. Stiady
,
A. Hand
,
+4 authors
T. Nantung
2003
Corpus ID: 106429902
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE