Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,199,002 papers from all fields of science
Search
Sign In
Create Free Account
Forensic Toolkit
Known as:
Forensic Tool Kit
Forensic Toolkit, or FTK, is a computer forensics software made by AccessData. It scans a hard drive looking for various information. It can for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Broader (1)
Computer forensics
Host protected area
List of data recovery software
List of digital forensics tools
Microsoft Windows
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Comparative Evaluation of Mobile Forensic Tools
J. Alhassan
,
R. T. Oguntoye
,
S. Misra
,
A. Adewumi
,
R. Maskeliūnas
,
Robertas Damaševičius
International Conference on Information…
2018
Corpus ID: 55199701
The rapid rise in the technology today has brought to limelight mobile devices which are now being used as a tool to commit crime…
Expand
Review
2015
Review
2015
A prototype forensic toolkit for industrial-control-systems incident response
Nickolas B. Carr
,
N. Rowe
Defense + Security Symposium
2015
Corpus ID: 59960078
Industrial control systems (ICSs) are an important part of critical infrastructure in cyberspace. They are especially vulnerable…
Expand
2013
2013
Redeye: a digital library for forensic document triage
P. Bogen
,
Amber McKenzie
,
Rob Gillen
ACM/IEEE Joint Conference on Digital Libraries
2013
Corpus ID: 700035
Forensic document analysis has become an important aspect of investigation of many different kinds of crimes from money…
Expand
2012
2012
On-the-spot digital investigation by means of LDFS: Live Data Forensic System
Kyung-Soo Lim
,
Antonio Savoldi
,
Changhoon Lee
,
Sangjin Lee
Mathematical and computer modelling
2012
Corpus ID: 43325683
2012
2012
A Model for Enabling an Effective Outcome-Oriented Communication Between the Scientific and Educational Communities
T. Ledley
,
Michael R. Taber
,
S. Lynds
,
B. Domenico
,
L. Dahlman
2012
Corpus ID: 21747932
ABSTRACT Traditionally, there has been a large gap between the scientific and educational communities in terms of communication…
Expand
2011
2011
A Common Scheme for Evaluation of Forensic Software
M. Hildebrandt
,
Stefan Kiltz
,
J. Dittmann
Sixth International Conference on IT Security…
2011
Corpus ID: 18679787
We introduce a first common evaluation scheme for forensic software. Therefore, we investigate potential attacks on forensic…
Expand
2010
2010
A Re-Ranking Method of Search Results Based on Keyword and User Interest
Ming Xu
,
Hong-Rong Yang
,
Ning Zheng
2010
Corpus ID: 17244096
The most common activity task for a forensic investigator is to search a hard disk for interesting evidences. The investigator…
Expand
2009
2009
XFT: a forensic toolkit for the original Xbox game console
David Collins
International Journal of Electronic Security and…
2009
Corpus ID: 207410631
The array of electronic storage devices is staggering in both number and type. The most common of these are in the form of fixed…
Expand
2008
2008
USB PassOn: Secure USB Thumb Drive Forensic Toolkit
Keun-Gi Lee
,
Hyewon Lee
,
Chang-Wook Park
,
Jewan Bang
,
Kwon-youp Kim
,
Sangjin Lee
Second International Conference on Future…
2008
Corpus ID: 9641686
The flash memory market has grown at an extremely fast rate, when compared with all other types of semiconductors. Much of this…
Expand
2001
2001
Your Computer Forensic Toolkit
Kelly J. Kuchta
Information Security Journal
2001
Corpus ID: 26751996
Abstract The last article was Part 1 of the series and was about building a computer forensics laboratory and what it should…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required