Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,501 papers from all fields of science
Search
Sign In
Create Free Account
Forensic Toolkit
Known as:
Forensic Tool Kit
Forensic Toolkit, or FTK, is a computer forensics software made by AccessData. It scans a hard drive looking for various information. It can for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Broader (1)
Computer forensics
Host protected area
List of data recovery software
List of digital forensics tools
Microsoft Windows
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Data analysis of file forensic investigation
Priyanka Salunkhe
,
Smita Bharne
,
Puja Padiya
Software and Compilers for Embedded Systems
2016
Corpus ID: 8697991
Rapidly growing Internet Technology may cause cybercrimes committed by attackers. Different type of digital devices is being used…
Expand
2014
2014
Data Generation and Analysis for Digital Forensic Application Using Data Mining
Prashant K. Khobragade
,
L. Malik
Fourth International Conference on Communication…
2014
Corpus ID: 16358241
In the cyber crime huge log data, transactional data occurs which tends to plenty of data for storage and analyze them. It is…
Expand
2014
2014
Development of a Tailored Methodology and Forensic Toolkit for Industrial Control Systems Incident Response
Nicholas Carr
2014
Corpus ID: 107471855
Abstract : This thesis presents a methodology for incident response to identify anomalies and malicious adversary persistence…
Expand
2012
2012
On-the-spot digital investigation by means of LDFS: Live Data Forensic System
Kyung-Soo Lim
,
Antonio Savoldi
,
Changhoon Lee
,
Sangjin Lee
Mathematical and computer modelling
2012
Corpus ID: 43325683
2012
2012
Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools
N. Raja
,
K. Arulanandam
,
R. Somasundaram
2012
Corpus ID: 55223977
This Paper discusses the digital forensic tool that uses a field Programmable Gate Array [FPGA] based software for deep packet…
Expand
2011
2011
A Common Scheme for Evaluation of Forensic Software
M. Hildebrandt
,
Stefan Kiltz
,
J. Dittmann
Sixth International Conference on IT Security…
2011
Corpus ID: 18679787
We introduce a first common evaluation scheme for forensic software. Therefore, we investigate potential attacks on forensic…
Expand
2010
2010
A Re-Ranking Method of Search Results Based on Keyword and User Interest
Ming Xu
,
Hong-Rong Yang
,
Ning Zheng
2010
Corpus ID: 17244096
The most common activity task for a forensic investigator is to search a hard disk for interesting evidences. The investigator…
Expand
Review
2007
Review
2007
An Overview of Steganography
James Madison
,
Shawn D. Dickman July
,
Shawn D. Dickman
2007
Corpus ID: 8412870
Steganography is a useful tool that allows covert transmission of information over an overt communications channel. Combining…
Expand
Review
2005
Review
2005
An overview of computer forensics
Phillip D Dixon
IEEE potentials
2005
Corpus ID: 25462454
The core goals of computer forensics are fairly straightforward: the preservation, identification, extraction, documentation, and…
Expand
2001
2001
Your Computer Forensic Toolkit
Kelly J. Kuchta
Information Security Journal
2001
Corpus ID: 26751996
Abstract The last article was Part 1 of the series and was about building a computer forensics laboratory and what it should…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE