Academic literature on the topic 'Forensic analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Forensic analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Forensic analysis"
Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Full textAntwi, Paul. "Device Information for Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 373–78. http://dx.doi.org/10.22624/aims/crp-bk3-p59.
Full textDodoo, Herbert Cyril. "Deep Learning (DL) Oriented Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 321–28. http://dx.doi.org/10.22624/aims/crp-bk3-p51.
Full textSabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.
Full textLee, Sang Young. "Mobile Digital Forensics Framework for Smartphone User Analysis." Webology 19, no. 1 (January 20, 2022): 4335–51. http://dx.doi.org/10.14704/web/v19i1/web19285.
Full textQureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.
Full textAdeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (January 2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.
Full textSukamto, Pria, Ispandi, Arman Syah Putra, Nurul Aisyah, and Rohmat Toufiq. "Forensic Digital Analysis for CCTV Video Recording." International Journal of Science, Technology & Management 3, no. 1 (January 22, 2022): 284–91. http://dx.doi.org/10.46729/ijstm.v3i1.460.
Full textHikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (January 7, 2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Full textAsamoah, Jonas Takyi. "Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness." Advances in Multidisciplinary and scientific Research Journal Publication 1 (July 26, 2022): 307–14. http://dx.doi.org/10.22624/aims/crp-bk3-p49.
Full textDissertations / Theses on the topic "Forensic analysis"
Fairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.
Full textRodríguez, Mariela, and James Winefordner. "Elemental Forensic Analysis of Glass." Revista de Química, 2007. http://repositorio.pucp.edu.pe/index/handle/123456789/99672.
Full textAt identifying glass as forensic evidence, there is a continued move away from dependence on physical properties measured, such as index of refraction and density, towards methods of elemental analysis of its traces. Several spectroscopic, radiochemical and mass spectrometry techniques have been applied for multielemental analysis of small samples of glass. This review shows some of the most commonly used methods, as well as their advantages and limitations.
Gettings, Katherine Butler. "Forensic Ancestry and Phenotype SNP Analysis and Integration with Established Forensic Markers." Thesis, The George Washington University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3590467.
Full textWhen an evidential DNA profile does not match identified suspects or profiles from available databases, further DNA analyses targeted at inferring the possible ancestral origin and phenotypic characteristics of the perpetrator could yield valuable information. Single Nucleotide Polymorphisms (SNPs), the most common form of genetic polymorphisms, have alleles associated with specific populations and/or correlated to physical characteristics. With this research, single base primer extension (SBE) technology was used to develop a 50 SNP assay designed to predict ancestry among the primary U.S. populations (African American, East Asian, European, and Hispanic/Native American), as well as pigmentation phenotype. The assay has been optimized to a sensitivity level comparable to current forensic DNA analyses, and has shown robust performance on forensic-type samples. In addition, three prediction models were developed and evaluated for ancestry in the U.S. population, and two models were compared for eye color prediction, with the best models and interpretation guidelines yielding correct information for 98% and 100% of samples, respectively. Also, because data from additional DNA markers (STR, mitochondrial and/or Y chromosome DNA) may be available for a forensic evidence sample, the possibility of including this data in the ancestry prediction was evaluated, resulting in an improved prediction with the inclusion of STR data and decreased performance when including mitochondrial or Y chromosome data. Lastly, the possibility of using next-generation sequencing (NGS) to genotype forensic STRs (and thus, the possibility of a multimarker multiplex incorporating all forensic markers) was evaluated on a new platform, with results showing the technology incapable of meeting the needs of the forensic community at this time.
Nilsson, Martina. "Mitochondrial DNA in Sensitive Forensic Analysis." Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-7458.
Full textShah, Jayna J. "Microfluidic devices for forensic DNA analysis." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2878.
Full textTitle from PDF t.p. (viewed Jan. 22, 2008). Thesis director: Rao V. Mulpuri. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering. Vita: p. 159. Includes bibliographical references (p. 145-158). Also available in print.
Ogwu, John. "Forensic pharmaceutical analysis of counterfeit medicines." Thesis, De Montfort University, 2018. http://hdl.handle.net/2086/17552.
Full textvan, den Berg Jelle, and Filip Lagerholm. "Forensic Analysis of the Nintendo Switch." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42451.
Full textLu, Andy. "Forensic analysis on wireless medical devices." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2541.
Full textEide, Jarle, and Jan Ove Skogheim Olsen. "Forensic analysis of an unknown embedded device." Thesis, Norges Teknisk-Naturvitenskaplige Universitet, Institutt for datateknikk og informasjonsvitenskap, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10060.
Full textEvery year thousands of new digital consumer device models come on the market. These devices include video cameras, photo cameras, computers, mobile phones and a multitude of different combinations. Most of these devices have the ability to store information in one form or another. This is a problem for law enforcement agencies as they need access to all these new kinds of devices and the information on them in investigations. Forensic analysis of electronic and digital equipment has become much more complex lately because of the sheer number of new devices and their increasing internal technological sophistication. This thesis tries to help the situation by reverse engineering a Qtek S110 device. More specifically we analyze how the storage system of this device, called the object store, is implemented on the devices operating system, Windows Mobile. We hope to figure out how the device stores user data and what happens to this data when it is "deleted". We further try to define a generalized methodology for such forensic analysis of unknown digital devices. The methodology takes into account that such analysis will have to be performed by teams of reverse-engineers more than single individuals. Based on prior external research we constructed and tested the methodology successfully. We were able to figure our more or less entirely the object stores internal workings and constructed a software tool called BlobExtractor that can extract data, including "deleted", from the device without using the operating system API. The main reverse engineering strategies utilized was black box testing and disassembly. We believe our results can be the basis for future advanced recovery tools for Windows Mobile devices and that our generalized reverse engineering methodology can be utilized on many kinds of unknown digital devices.
Edlund, Hanna. "Sensitive Identification Tools in Forensic DNA Analysis." Doctoral thesis, Uppsala universitet, Institutionen för genetik och patologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-131904.
Full textBooks on the topic "Forensic analysis"
Rudin, Norah. Forensic DNA analysis: Protocols in forensic science. Boca Raton, FL: CRC, 2002.
Find full textBelair, Robert R. Forensic DNA analysis: Issues. Washington, D.C: U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, 1991.
Find full textFile system forensic analysis. Boston, Mass: Addison-Wesley, 2005.
Find full textSQL server forensic analysis. Upper Saddle River, NJ: Addison-Wesley, 2008.
Find full textF, Dunn Patrick, ed. Uncertainty analysis for forensic science. 2nd ed. Tucson, Ariz: Lawyers & Judges Pub., 2009.
Find full textFairgrieve, Scott I. Forensic cremation recovery and analysis. Boca Raton: Taylor & Francis, 2008.
Find full textEoghan, Casey, ed. Windows forensic analysis: DVD toolkit. 2nd ed. Burlington, MA: Syngress Pub., 2009.
Find full textBrach, Raymond M. Uncertainty analysis for forensic science. 2nd ed. Tucson, Ariz: Lawyers & Judges Pub., 2009.
Find full textHamilton, Sue L. DNA analysis: Forensic fluids & follicles. Edina, Minn: ABDO Pub. Co., 2008.
Find full textTaroni, Franco, Silvia Bozza, Alex Biedermann, Paolo Garbolino, and Colin Aitken. Data Analysis in Forensic Science. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470665084.
Full textBook chapters on the topic "Forensic analysis"
Resano, Martín, and Frank Vanhaecke. "Forensic Applications." In Isotopic Analysis, 391–418. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2012. http://dx.doi.org/10.1002/9783527650484.ch14.
Full textLorenzini, Rita, and Luisa Garofalo. "Wildlife Forensics: DNA Analysis in Wildlife Forensic Investigations." In Forensic DNA Analysis, 357–84. Includes bibliographical references and index.: Apple Academic Press, 2020. http://dx.doi.org/10.1201/9781003043027-16.
Full textFinnigan, Pete. "Forensic Analysis." In Oracle Incident Response and Forensics, 155–75. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3264-4_5.
Full textZięba-Palus, Janina, and Maria Kała. "Forensic Analytics." In Handbook of Trace Analysis, 281–329. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-19614-5_11.
Full textDiMaggio, John A., and Wesley Vernon. "Forensic Gait Analysis." In Forensic Podiatry, 103–15. Totowa, NJ: Humana Press, 2010. http://dx.doi.org/10.1007/978-1-61737-976-5_6.
Full textDettmeyer, Reinhard B., Marcel A. Verhoff, and Harald F. Schütz. "Forensic DNA Analysis." In Forensic Medicine, 357–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38818-7_22.
Full textJoshi, R. C., and Emmanuel S. Pilli. "Network Forensic Analysis." In Computer Communications and Networks, 107–29. London: Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7299-4_6.
Full textPrinz, Mechthild, and Ruediger Lessig. "Forensic DNA Analysis." In Handbook of Forensic Medicine, 1141–83. Oxford, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118570654.ch63.
Full textBartick, Edward G. "Criminal Forensic Analysis." In Infrared and Raman Spectroscopy in Forensic Science, 87–109. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781119962328.ch4.
Full textLópez-Monroy, A. Pastor, Hugo Jair Escalante, Manuel Montes-y-Gómez, and Xavier Baró. "Forensic Analysis Recognition." In Engineering Data-Driven Adaptive Trust-based e-Assessment Systems, 1–18. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29326-0_1.
Full textConference papers on the topic "Forensic analysis"
McKay, Christine, Ashwin Swaminathan, Hongmei Gou, and Min Wu. "Image acquisition forensics: Forensic analysis to identify imaging source." In ICASSP 2008 - 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2008. http://dx.doi.org/10.1109/icassp.2008.4517945.
Full textWesevich, James W., and Douglas B. Olson. "Explosion Forensic Analysis." In Structures Congress 2005. Reston, VA: American Society of Civil Engineers, 2005. http://dx.doi.org/10.1061/40753(171)249.
Full textSingh, Kumar Shanu, Annie Irfan, and Neelam Dayal. "Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036214.
Full textGhabban, Fahad M., Ibrahim M. Alfadli, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm, and Mahmoud Ahmad Al-Khasawneh. "Comparative Analysis of Network Forensic Tools and Network Forensics Processes." In 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2021. http://dx.doi.org/10.1109/icscee50312.2021.9498226.
Full textWhitehurst, Frederic. "Forensic analysis of explosives." In Critical Review Collection. SPIE, 1992. http://dx.doi.org/10.1117/12.141391.
Full textEdwards, Thomas R. "Forensic video image analysis." In Enabling Technologies for Law Enforcement and Security, edited by John Hicks, Peter R. De Forest, and Vivian M. Baylor. SPIE, 1997. http://dx.doi.org/10.1117/12.266311.
Full textPeisert, Sean, Sidney Karin, Matt Bishop, and Keith Marzullo. "Principles-driven forensic analysis." In the 2005 workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146291.
Full textIqbal, Asif, Johannes Olegard, Ranjana Ghimire, Shirin Jamshir, and Andrii Shalaginov. "Smart Home Forensics: An Exploratory Study on Smart Plug Forensic Analysis." In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2020. http://dx.doi.org/10.1109/bigdata50022.2020.9378183.
Full textAtaei, Hossein, and Abdel-Salam M. Niazy. "Buckling Analysis of Arched Structures Using Finite Element Analysis." In Seventh Congress on Forensic Engineering. Reston, VA: American Society of Civil Engineers, 2015. http://dx.doi.org/10.1061/9780784479711.080.
Full textNelson, Erik L., Deepak Ahuja, Stewart M. Verhulst, and Erin Criste. "Roof Collapse: Forensic Uplift Failure Analysis." In Fourth Forensic Engineering Congress. Reston, VA: American Society of Civil Engineers, 2006. http://dx.doi.org/10.1061/40853(217)47.
Full textReports on the topic "Forensic analysis"
Vaughan, Phillip, Golnar Nabizadeh, Laura Findlay, Heather Doran, Niamh Nic Daeid, and Mark Brown. Understanding Forensic Gait Analysis #1. Edited by Chris Murray. University of Dundee, February 2020. http://dx.doi.org/10.20933/100001152.
Full textEsposito, Stephen J. Analysis of Forensic Super Timelines. Fort Belvoir, VA: Defense Technical Information Center, June 2012. http://dx.doi.org/10.21236/ada562672.
Full textChinn, Menzie, Barry Eichengreen, and Hiro Ito. A Forensic Analysis of Global Imbalances. Cambridge, MA: National Bureau of Economic Research, October 2011. http://dx.doi.org/10.3386/w17513.
Full textVelsko, S. Validation Strategies for Microbial Forensic Analysis. Office of Scientific and Technical Information (OSTI), August 2012. http://dx.doi.org/10.2172/1056616.
Full textDavid Baldwin, Max Morris, Stan Bajic, Zhigang Zhou, and James Kreiser. Statistical Tools for Forensic Analysis of Toolmarks. Office of Scientific and Technical Information (OSTI), April 2004. http://dx.doi.org/10.2172/825030.
Full textReilly, Dallas D. Molecular Forensic Science Analysis of Nuclear Materials. Office of Scientific and Technical Information (OSTI), October 2012. http://dx.doi.org/10.2172/1053139.
Full textBorg, L., and I. Hutcheon. Forensic Analysis of samples from the Nuclear Fuel Cycle. Office of Scientific and Technical Information (OSTI), May 2013. http://dx.doi.org/10.2172/1080397.
Full textChandramouli, Ramaswamy, Anoop Singhal, Duminda Wijesekera, and Changwei Liu. Methodology for enabling forensic analysis using hypervisor vulnerabilities data. Gaithersburg, MD: National Institute of Standards and Technology, June 2019. http://dx.doi.org/10.6028/nist.ir.8221.
Full textHoeksema, Amy Beth. Statistical methods for the forensic analysis of striated tool marks. Office of Scientific and Technical Information (OSTI), January 2013. http://dx.doi.org/10.2172/1226173.
Full textSpotts, Ryan E. Objective forensic analysis of striated, quasi-striated and impressed toolmarks. Office of Scientific and Technical Information (OSTI), December 2014. http://dx.doi.org/10.2172/1227283.
Full text