Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Forensic Toolkit

Known as: Forensic Tool Kit 
Forensic Toolkit, or FTK, is a computer forensics software made by AccessData. It scans a hard drive looking for various information. It can for… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Data Integration Systems (DIS) are concerned with integrating data from multiple data sources to resolve user queries. Typically… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
2013
2013
Cyber attack comes in various approach and forms, either internally or externally. Remote access and spyware are forms of cyber… Expand
  • figure 1
  • table II
  • figure 2
  • figure 2
  • figure 3
2013
2013
Mobile devices are increasingly being used as a source of digital evidence in criminal investigations. Mobile forensic toolkit… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2012
Highly Cited
2012
Abstract We expose and explore technical and trust issues that arise in acquiring forensic evidence from infrastructure-as-a… Expand
  • figure 1
  • table 1
  • table 2
2011
2011
We introduce a first common evaluation scheme for forensic software. Therefore, we investigate potential attacks on forensic… Expand
  • table I
  • table II
  • figure 1
2010
2010
The most common activity task for a forensic investigator is to search a hard disk for interesting evidences. The investigator… Expand
Highly Cited
2009
Highly Cited
2009
Computer Forensics is mainly about investigating crime where computers have been involved. There are many tools available to aid… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2007
Review
2007
Steganography is a useful tool that allows covert transmission of information over an overt communications channel. Combining… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2006
2006
The subject of computer forensics is still new and both challenging and intriguing for students. Cal Poly Pomona has offered this… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2005
Highly Cited
2005
Preface. Acknowledgments. About the Authors. Case Studies. I. LIVE INCIDENT RESPONSE. 1. Windows Live Response. 2. Unix Live… Expand