Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

List of digital forensics tools

Known as: Digital Forensic Tools, Forensic software, List of digital forensic tools 
During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
We describe the design, implementation, and evaluation of FROST-three new forensic tools for the OpenStack cloud platform. Our… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2012
Highly Cited
2012
Abstract We expose and explore technical and trust issues that arise in acquiring forensic evidence from infrastructure-as-a… Expand
  • figure 1
  • table 1
  • table 2
Highly Cited
2012
Highly Cited
2012
Advanced metering devices (smart meters) are being installed throughout electric networks in Germany (as well as in other parts… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
2011
2011
Cloud computing has become one of mobile's hottest topics. Moving computing processing and data storage away from mobile devices… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
2011
2011
We introduce a first common evaluation scheme for forensic software. Therefore, we investigate potential attacks on forensic… Expand
  • table I
  • table II
  • figure 1
2009
2009
Computer forensic software is used by lawyers and law enforcement to collect and preserve data in a “forensic image” so that it… Expand
Highly Cited
2008
Highly Cited
2008
Digital forensic tools are being developed at a brisk pace in response to the ever increasing variety of forensic targets. Most… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
2007
2007
Current digital forensics methods capture, preserve, and analyze digital evidence in general-purpose electronic containers… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2007
Highly Cited
2007
Post-event timeline reconstruction plays a critical role in forensic investigation and serves as a means of identifying evidence… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2007
2007
Many forensic computing practitioners work in a high workload and low resource environment. With the move by the discipline to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4