Semantic Scholar uses AI to extract papers important to this topic.
Data Integration Systems (DIS) are concerned with integrating data from multiple data sources to resolve user queries. Typically… Expand Cyber attack comes in various approach and forms, either internally or externally. Remote access and spyware are forms of cyber… Expand Mobile devices are increasingly being used as a source of digital evidence in criminal investigations. Mobile forensic toolkit… Expand Abstract We expose and explore technical and trust issues that arise in acquiring forensic evidence from infrastructure-as-a… Expand We introduce a first common evaluation scheme for forensic software. Therefore, we investigate potential attacks on forensic… Expand The most common activity task for a forensic investigator is to search a hard disk for interesting evidences. The investigator… Expand Computer Forensics is mainly about investigating crime where computers have been involved. There are many tools available to aid… Expand Steganography is a useful tool that allows covert transmission of information over an overt communications channel. Combining… Expand The subject of computer forensics is still new and both challenging and intriguing for students. Cal Poly Pomona has offered this… Expand Preface. Acknowledgments. About the Authors. Case Studies. I. LIVE INCIDENT RESPONSE. 1. Windows Live Response. 2. Unix Live… Expand