Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,780,353 papers from all fields of science
Search
Sign In
Create Free Account
List of digital forensics tools
Known as:
Digital Forensic Tools
, Forensic software
, List of digital forensic tools
During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Cain and Abel
Computer forensics
Digital Forensics Framework (DFF)
EnCase
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The Problem of Defining the Objects of Forensic Software Analysis and Its Solution via R.S. Belkin's Reflection Theory
A. I. Semikalenova
2017
Corpus ID: 145962354
Review
2016
Review
2016
NVM express drives and digital forensics
Bruce J. Nikkel
Digital Investigation. The International Journal…
2016
Corpus ID: 36092686
2015
2015
Digital Forensic Investigations in the Cloud: A Proposed Approach for Irish Law Enforcement
J. Plunkett
,
Nhien-An Le-Khac
,
Mohand Tahar Kechadi
2015
Corpus ID: 28938032
11th Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP119 2015), Orlando, Florida, United States, 26 - 28…
Expand
2011
2011
A Common Scheme for Evaluation of Forensic Software
M. Hildebrandt
,
Stefan Kiltz
,
J. Dittmann
Sixth International Conference on IT Security…
2011
Corpus ID: 18679787
We introduce a first common evaluation scheme for forensic software. Therefore, we investigate potential attacks on forensic…
Expand
Highly Cited
2010
Highly Cited
2010
Steganography and Visual Cryptography in Computer Forensics
G. Abboud
,
Jeffrey S. Marean
,
Roman V Yampolskiy
Fifth IEEE International Workshop on Systematic…
2010
Corpus ID: 10794482
Abstract— Recently, numerous novel algorithms have been proposed in the fields of steganography and visual cryptography with the…
Expand
2009
2009
Agents, Trojans and tags: The next generation of investigators
Wiebke Abel
2009
Corpus ID: 62766918
In a statement the Council of the European Union has recommended that member states should introduce clandestine remote searches…
Expand
2007
2007
Forensic discovery auditing of digital evidence containers
G. Richard
,
Vassil Roussev
,
Lodovico Marziale
Digital Investigation. The International Journal…
2007
Corpus ID: 17779786
2006
2006
The use of self-organising maps for anomalous behaviour detection in a digital investigation
B. K. L. Feia
,
J. H. P. Eloffa
,
M. S. Oliviera
,
H. S. Ventera
2006
Corpus ID: 31952556
The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital…
Expand
Review
2004
Review
2004
PDA Forensic Tools: An Overview and Analysis
Richard P. Ayers
,
W. Jansen
2004
Corpus ID: 1253880
Digital handheld devices, such as Personal Digital Assistants (PDAs), are becoming more affordable and commonplace in the…
Expand
2004
2004
An Analysis of the Integrity of Palm Images Acquired with PDD
Christian Frichot
Australian Computer, Network & Information…
2004
Corpus ID: 1200994
With the growth of Personal Digital Assistants (PDA), pocket-sized digital music players and smart phones the need for digital…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE