To see the other types of publications on this topic, follow the link: Forensic analysis.

Journal articles on the topic 'Forensic analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Forensic analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.

Full text
Abstract:
This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices. The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns to be recognized i.e., a pattern of different faces and fingerprints. These attributes are then utilized for the further process in the analysis phase which provides attention on various techniques of pattern recognition that are applied to digital forensic examinations and is proposed to develop different forensic tools to collect evidence that would be helpful to solve specific types of crimes. This evidence further helps the examiner in the analysis phase of the digital forensic process by identifying the applicable data.
APA, Harvard, Vancouver, ISO, and other styles
2

Antwi, Paul. "Device Information for Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 373–78. http://dx.doi.org/10.22624/aims/crp-bk3-p59.

Full text
Abstract:
This document provides an overview of information for forensic analysis related to device name, serial number and model of devices used to connect to social networking platforms. The increasing use of social networking applications on smartphones makes these devices a gold mine for forensic researchers. Potential evidence can be captured on these devices and recovered with the right tools and research methods. The increasing proliferation of network devices in homes and buildings increases the possibilities of finding digital traces relevant to an investigation, physical or virtual: cyber-attacks, identity theft, etc. connected to the network can also find useful traces on the devices themselves found or stored in an associated cloud account that can be identified by device ID, model, and serial number. Keywords: Digital Forensics; Device Information, Evidence, Storage, Cyber forensics framework. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Paul Antwi (2022): Device Information for Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 373-378 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P59
APA, Harvard, Vancouver, ISO, and other styles
3

Dodoo, Herbert Cyril. "Deep Learning (DL) Oriented Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 321–28. http://dx.doi.org/10.22624/aims/crp-bk3-p51.

Full text
Abstract:
Cyber-attacks are now more prevalent than ever before in all aspects of our daily lives. As a result of this circumstance, both individuals and organizations are fighting cybercrime on a regular basis. Furthermore, today's hackers have advanced a step further and are capable of employing complex cyber-attack strategies, exacerbating the problem. Some of these approaches are minute and undetectable, and they frequently masquerade as genuine requests and directives. To combat this threat, cyber security professionals, as well as digital forensic investigators, are constantly compelled to filter through massive and complicated pools of data, also known as Big Data, in order to uncover Potential Digital Forensic Evidence. that can be used as evidence in court. Potential Digital Evidence can then be used to assist investigators in reaching certain conclusions and/or judgments. The fact that Big Data frequently comes from various sources and has diverse file formats makes cyber forensics even more difficult for investigators. When it comes to the processing of vast amounts of complicated data for forensic purposes, forensic investigators typically have less time and budget to fulfil the rising demands. This paper will be studying how to incorporate Deep Learning cognitive computing approaches into Cyber Forensics Keywords: Deep Learning, Forensic Analysis, Artificial Intelligence, Online Safety, Evidence BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Herbert Cyril Dodoo (2022): Deep Learning (DL) Oriented Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 320-328 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P51
APA, Harvard, Vancouver, ISO, and other styles
4

Sabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.

Full text
Abstract:
This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forensics model for diverse technological ecosystems called Cyber Forensics Model in Digital Ecosystems (CFMDE). Transferring the knowledge, international collaboration, best practices and adopting new digital forensic tools, methodologies and techniques will be hereinafter paramount to obtain digital evidence, enforce organizational cybersecurity policies, mitigate security threats, fight anti-forensics practices and indict cybercriminals. The global Digital Forensics community ought to constantly update current practices to deal with cybercriminality and foreseeing how to prepare to new technological environments where change is always constant.
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Sang Young. "Mobile Digital Forensics Framework for Smartphone User Analysis." Webology 19, no. 1 (January 20, 2022): 4335–51. http://dx.doi.org/10.14704/web/v19i1/web19285.

Full text
Abstract:
Blockchain-based digital forensics technology is an efficient way to prevent forgery/modulation of evidence including collecting and analyzing evidential data using the technology in compliance with smartphone forensics procedures after a smartphone is seized. Moreover, the use of large-capacity storage devices and various digital devices have become a realistic solution for its development of IT in situations where the existing digital forensics analysis methods are regarded as limitations. This paper analyzed user’s status on smartphone application and implemented a smartphone user analysis framework that may extract significant digital evidence in a digital forensic way based on a blockchain perspective. In this paper researched a system that may provide important information to digital forensic analysts through these frameworks. It is expected that the proposed system will be expanded by much more structured data and online unstructured data such as SNS reports.
APA, Harvard, Vancouver, ISO, and other styles
6

Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.

Full text
Abstract:
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be used to identify the source of the intrusion and the intruder’s location. Forensics can resolve many cybercrime cases using the methods of network forensics. These methods can extract intruder’s information, the nature of the intrusion, and how it can be prevented in the future. These techniques can also be used to avoid attacks in near future. Modern network forensic techniques face several challenges that must be resolved to improve the forensic methods. Some of the key challenges include high storage speed, the requirement of ample storage space, data integrity, data privacy, access to IP address, and location of data extraction. The details concerning these challenges are provided with potential solutions to these challenges. In general, the network forensic tools and techniques cannot be improved without addressing these challenges of the forensic network. This paper proposed a thematic taxonomy of classifications of network forensic techniques based on extensive. The classification has been carried out based on the target datasets and implementation techniques while performing forensic investigations. For this purpose, qualitative methods have been used to develop thematic taxonomy. The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate the information related to network attacks with minimum false-negative results. It will help organizations to investigate external and internal causes of network security attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Adeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (January 2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.

Full text
Abstract:
Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as well as to investigators, and ultimately, researchers. The need for an efficient cutting-edge research finding in curbing network crimes therefore is undeniably critical. This paper describes the distinction between network security and network forensics. In addition, the authors identify factors that militate against most network forensic techniques as well as the research challenges in network forensics. Furthermore, the paper discusses on the current research works on network forensics analysis. This research is useful to the research community of network forensics, for knowledge on existing research techniques, and direction on further research in network forensics.
APA, Harvard, Vancouver, ISO, and other styles
8

Sukamto, Pria, Ispandi, Arman Syah Putra, Nurul Aisyah, and Rohmat Toufiq. "Forensic Digital Analysis for CCTV Video Recording." International Journal of Science, Technology & Management 3, no. 1 (January 22, 2022): 284–91. http://dx.doi.org/10.46729/ijstm.v3i1.460.

Full text
Abstract:
The background of this research is how to make a video that can be analyzed as forensic data to prove the truth of the video, therefore with forensics it can be used as evidence if the video contains incorrect data or contains data capable of crime so that it can be used as data forensics. The method used in this study is to use the literature review method which uses the basis of many previous studies. From journals and books based on similar research, so that it can help develop existing problems to the latest problems so that they can find novelty in this research. The problem raised in this research is how to make a video from a CCTV that can be proven, by certain methods in order to make the video as forensic data, that can be proven so that it can be developed into data containing crimes that can be used as evidence. The purpose of this study is how to find the right method in order to analyze a CCTV video, so that it can be used as evidence on forensic data with the NIST method, it can be proven that this method is the right method in analyzing a video, so that it can be used as evidence and as data forensics.
APA, Harvard, Vancouver, ISO, and other styles
9

Hikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (January 7, 2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.

Full text
Abstract:
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.
APA, Harvard, Vancouver, ISO, and other styles
10

Asamoah, Jonas Takyi. "Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness." Advances in Multidisciplinary and scientific Research Journal Publication 1 (July 26, 2022): 307–14. http://dx.doi.org/10.22624/aims/crp-bk3-p49.

Full text
Abstract:
The usage of digital technology in the digital forensic investigation has grown in tandem with the rising importance of technology today. Too many incidences of digital and physical crime which is the focus of the world nowadays. To gather the finest evidence and investigative outcomes, a digital forensic model must be established. This study included a review of the literature on digital forensics and models established in digital forensics. According to the findings, the majority of research involves broad inquiries and procedures that overlap. Furthermore, no model has been developed to design a systemic inquiry. In this study, we propose a methodology for digital forensic examination to address this issue. This model combines several of the previous models and adds some new variables that are relevant to the study. Keywords: Due Diligence, Threats, Forensic Analysis, Preparation, Readiness, Cyber Security, BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Jonas Takyi Asamoah (2022): Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 307-314 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P49
APA, Harvard, Vancouver, ISO, and other styles
11

Alotaibi, Fahad Mazaed, Arafat Al-Dhaqm, Yasser D. Al-Otaibi, and Abdulrahman A. Alsewari. "A Comprehensive Collection and Analysis Model for the Drone Forensics Field." Sensors 22, no. 17 (August 29, 2022): 6486. http://dx.doi.org/10.3390/s22176486.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be applied to several purposes, especially in smart cities. These involve traffic observation, environmental monitoring, and public safety. The need to realize effective drone forensic processes has mainly been reinforced by drone-based evidence. Drone-based evidence collection and preservation entails accumulating and collecting digital evidence from the drone of the victim for subsequent analysis and presentation. Digital evidence must, however, be collected and analyzed in a forensically sound manner using the appropriate collection and analysis methodologies and tools to preserve the integrity of the evidence. For this purpose, various collection and analysis models have been proposed for drone forensics based on the existing literature; several models are inclined towards specific scenarios and drone systems. As a result, the literature lacks a suitable and standardized drone-based collection and analysis model devoid of commonalities, which can solve future problems that may arise in the drone forensics field. Therefore, this paper has three contributions: (a) studies the machine learning existing in the literature in the context of handling drone data to discover criminal actions, (b) highlights the existing forensic models proposed for drone forensics, and (c) proposes a novel comprehensive collection and analysis forensic model (CCAFM) applicable to the drone forensics field using the design science research approach. The proposed CCAFM consists of three main processes: (1) acquisition and preservation, (2) reconstruction and analysis, and (3) post-investigation process. CCAFM contextually leverages the initially proposed models herein incorporated in this study. CCAFM allows digital forensic investigators to collect, protect, rebuild, and examine volatile and nonvolatile items from the suspected drone based on scientific forensic techniques. Therefore, it enables sharing of knowledge on drone forensic investigation among practitioners working in the forensics domain.
APA, Harvard, Vancouver, ISO, and other styles
12

Okan, Emmanuel Tettey. "Forensic Analysis on Streaming Multimedia." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 221–26. http://dx.doi.org/10.22624/aims/crp-bk3-p36.

Full text
Abstract:
Since the advent of technology and digitalization of multimedia, there has been a massive increase in cybercrime. During streaming, with the availability of a network or internet source, multimedia; audio and visual can easily be accessed whiles being aired live. This technology dates as far back as 1990s. Similar to still videos and images, the user is able to download, pause, reverse or forward the show. The ability to stream multimedia has made it easier for users to partake or retrieve multimedia from the comfort of their homes, offices or personal spaces without necessarily being present. However, there are several challenges that affect the functionality of this technology, slow network connection and cybercrime. The issue of slow network may easily be handled by network providers, but cybercrimes has become rampant over the years. These attackers, also known as cyber criminals, use various activities to attack data. Some of their activities include phishing, data breach, identity theft and harassment. The paper has been written to assess forensic analysis of streaming multimedia. While exploring existing studies, it was realized that despite the rich availability of digital image forensics, video forensics hasn’t been explored much. This is because of the difficulty involved in analyzing the video data. Video data is always presented in a compressed form, unlike still images that are obtained in their original state. The compressed data often cancels or totally compromises the existing fingerprints, hence making it difficult to monitor or recover data. It was also revealed that, much has not been done so far as the research area is concerned. Keywords: Mobile Forensics, Cybersecurity, Streaming, Media, Video, Networks BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Tettey Okan (2022): Forensic Analysis On Streaming Multimedia Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 221-226 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P36
APA, Harvard, Vancouver, ISO, and other styles
13

Amparbeng, Maxwell. "Inaccessibility of Services as a Threat to Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 20, 2022): 29–34. http://dx.doi.org/10.22624/aims/crp-bk3-p5.

Full text
Abstract:
Computer and Internet-based crimes are widespread problems that affect a vast number of individuals. Combating such criminals has become a difficult task for competent authorities, as it has enabled a new wave of criminal activity. This phenomenon has drew the attention of security and justice systems all over the world, and these institutions must now deal with the task of reforming and redefining the laws and methodologies used to investigate computer-related criminal activity (Garfinkel, 2010). On the other hand cybercriminals are also making use of existing technologies or systems and new means or techniques to make cybercrime detection, investigation and prevention very difficult. The paper will look at anti-forensics strategies such as data concealment, artefact erasure, trail obfuscation, and attacks on the forensic instruments themselves. Investigators must deal with anti-forensics approaches on a regular basis as digital forensics becomes more significant in current investigations. This article will explore the challenges that investigators and forensic practitioners face when conducting investigations. Keywords: Digital Forensics, Cloud Computing, Cloud Service Provider, Full Disk Encryption
APA, Harvard, Vancouver, ISO, and other styles
14

Dumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.

Full text
Abstract:
The article deals with some aspects of digitalization of forensic activity, such as improving the efficiency of search and cognitive activity of an investigator using digital technologies, and effective organization of such activity. Use of computer hardware, software, various computer and digital technologies and scripting to investigate crimes. The definitions of “digital trace” and “virtual trace” demonstrate the complexity of these issues. Certain dynamic movement of criminal activity in the information environment is analyzed. Defines the concept of virtual trace as a specific trace of certain actions in the information space of computer devices and their network systems. In considering the definition of the concept of virtual trace, the views of scientists such as V.A. Meshcheriakov, V.V. Poliakov and Smushkin A.V. The aspects of consideration of forensic digitization are identified, among which the main ones are: – use of digital technologies to increase the effectiveness of search and cognitive activity of the investigator, effective organization of this activity at the present level, optimization of interaction of different bodies, institutions in the investigation of crimes. – the use of information and communication technologies to investigate crimes. – solving didactic tasks in the field of training, retraining, advanced training of investigators, criminal investigators, forensic experts, improvement of their qualification, exchange of experience. The further question of the development of forensic science in the field of information society is investigated. It is determined in what form the information forensics will exist, namely: A new section of classic forensics that focuses on working with digital and virtual footprints. The new science of “digital or virtual forensics”. 3. Independent forensic science within the framework of the general theory of forensic science, which integrates the development of virtual traces, the use of new technical means of finding, fixing, research, use in proving forensically relevant information, technologies that ensure the effectiveness of the investigator.
APA, Harvard, Vancouver, ISO, and other styles
15

Vadlamudi, Divya, Dr K. Thirupathi Rao, Pellakuri Vidyullatha, and B. AjasekharReddy. "Analysis on digital forensics challenges and anti-forensics techniques in cloud computing." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 1072. http://dx.doi.org/10.14419/ijet.v7i2.7.12230.

Full text
Abstract:
In the modern life, there is a rapid increase in the usage of the technology. One reason of increasing the technology is usage of cloud. The mobile devices or any other technological devices mainly depend on cloud. The cloud can be accessible from anywhere. Cloud forensic process had introduced to help the investigators to find the evidence when the criminal attacks the cloud and to maintain the integrity and security for the data stored in the cloud. The increasing in the criminal attacks in cloud, made the investigators to find the latest methods for the forensic investigation process. Similarly in the same way the criminals also discover new ways to hide the source of evidences. This causes damage to the investigation process and is called anti-forensics. To hide the sources anti-forensic techniques are used and research must be done against the anti-forensics techniques in cloud environment. In this paper we focused mainly on detailed study on various challenges in cloud forensic and anti-forensic techniques.
APA, Harvard, Vancouver, ISO, and other styles
16

Kroz, M. V., and N. A. Ratinova. "History and Current State of Forensic Analysis of Extremist Materials." Theory and Practice of Forensic Science, no. 3(43) (September 30, 2016): 146–54. http://dx.doi.org/10.30764/64/1819-2785-2016-3-146-154.

Full text
Abstract:
The paper looks at the history and current state of forensic analysis of the content and intentionality of contentious (extremist) materials. It discusses different approaches based in linguistics, psychology, and social sciences/humanities, as well as issues relating to integrated forensic psycholinguistic analysis. Techniques and methodological recommendations described in the paper were developed by the experts of the Research Institute for Law and Order of the Prosecutor General's Office of the Russian Federation, various national forensic organizations, such as the Russian Federal Center of Forensic Science of the Ministry of Justice of the Russian Federation, the Forensic Science Center of the Ministry of Internal Affairs of the Russian Federation, forensic divisions of the Federal Security Service of the Russian Federation, and members of the scientific community. Generic methodologies (linguistic and psycholinguistic) proposed by government agency specialists for the forensic evaluation of extremism manifestations are discussed, including the level of methodological sophistication, and the problem of methodological harmonization in this field of forensics.
APA, Harvard, Vancouver, ISO, and other styles
17

Jafari, Fakeeha, and Rabail Shafique Satti. "Comparative Analysis of Digital Forensic Models." Journal of Advances in Computer Networks 3, no. 1 (2015): 82–86. http://dx.doi.org/10.7763/jacn.2015.v3.146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hammond, Roselyn Abena Terbie. "Smartphone RSS Traces For Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 227–32. http://dx.doi.org/10.22624/aims/crp-bk3-p37.

Full text
Abstract:
This paper’s topic is on Smartphone RSS traces for Forensic analysis; RSS represents Really Simple Syndication whereas smartphone RSS traces refers to a small software program that collects and displays RSS feeds. It allows you to scan headlines from a number of news sources in a central location and has the ability to suggest information of interest to you based on the criteria of your search. RSS feed has been in existence for many years but has never been as widely used as it is today, the term syndication refers to publishing information on the Internet that can be used by other sites as well as by stand-alone reader applications. The introduction of blogs hyped content syndication before, the syndicated content, known as feeds, was typically found on news sites only. Once blogs began proliferating on the Internet, content started being shared left and right, and users began using readers and aggregators to track their favorite blogs. In addition, those who subscribe to podcasts are actually using technology built on RSS. Whether providing a feed for a blog, providing a feed of changes for some software you may be writing, or doing your own podcast, the applications for content syndication are almost endless, and its usage is growing at a phenomenal rate every day.” Robert Richards, January 2006- Article on “RSS feed and content Syndication”. Forensically, Smartphone RSS feed gives the forensic examiner a fair idea about the conception of the individual whose phone contains the analyzed feed. This is because the feed usually contains information of interest to the user which helps you think like the user in order to get the needed information you are looking for. This paper will also identify gaps with smartphone RSS feed users and suggest solutions/recommendations to mitigate them in order to be safe even after subscribing to certain RSS feeds. Keywords: RSS, Forensics, Syndication, Tracing, Cybersecurity, Feeds BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Roselyn Abena Terbie Hammond (2022): Smartphone RSS Traces For Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 227-232 www.isteams.net/ITlawbookchapter2022. dx.doi.org/
APA, Harvard, Vancouver, ISO, and other styles
19

Faiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (March 30, 2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.

Full text
Abstract:
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.
APA, Harvard, Vancouver, ISO, and other styles
20

Badger, Eric Sowah. "Liabilities of Shared System in Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 191–96. http://dx.doi.org/10.22624/aims/crp-bk3-p31.

Full text
Abstract:
In today’s connected world, there is a tendency for connectivity even in the sectors which conventionally have been not so connected in the past, such as power systems substations. Substations have seen considerable digitalization of the grid hence, providing much more available insights than before. This has all been possible due to connectivity, digitalization, and automation of the power grids. Interestingly, this also means that anybody can access such critical infrastructures from a remote location, and gone are the days of physical barriers. The power of connectivity and control makes it a much more challenging task to protect critical industrial control systems. This capability comes at a price, in this case, increasing the liabilities and risk of potential cyber threats to substations. (ASIF, FARHAN , & EKSTEDT) Keywords: Digital Evidence Backlog, Digital Forensic Challenges BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Eric Sowah Badger (2022): Liabilities of Shared System in Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 191-196 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P31
APA, Harvard, Vancouver, ISO, and other styles
21

Sheldon, Andrew. "Forensic analysis." Infosecurity 4, no. 8 (November 2007): 17. http://dx.doi.org/10.1016/s1754-4548(07)70196-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ballou, Susan, John Goodpaster, William MacCrehan, and Dennis Reeder. "Forensic analysis." Analytical and Bioanalytical Chemistry 376, no. 8 (August 1, 2003): 1149–50. http://dx.doi.org/10.1007/s00216-003-2068-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lloyd, J. B. F., and J. G. Sutton. "Forensic analysis." Analytical Proceedings 24, no. 8 (1987): 239. http://dx.doi.org/10.1039/ap9872400239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bhatia, Manjot Kaur, Palak Gambhir, Shefali Sinha, and Saksham Kumar Singh. "A Comparative Analysis of OS Forensics Tools." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (November 30, 2022): 494–502. http://dx.doi.org/10.22214/ijraset.2022.47346.

Full text
Abstract:
Abstract: The internet is expanding at a breakneck pace, as the number of crimes perpetrated using or against computers. The area of computer forensics has arisen in reaction to the rise of computer crime. Computer forensics is the meticulous collection and examination of electronic evidence that not only analyses the damage to a computer because of an electronic attack but also recovers lost data from such a system to convict a criminal. As a result, the standard forensic process that is required after an electronic attack involves collecting evidence from a computer system, analyzing, and presentation of the collected evidence in court. Forensics deals primarily with the recovery and analysis of latent evidence. The growth of digital forensics has substantially increased the requirement for effective tools. There are several tools available today which are used to investigate the OS of a given computer. The purpose of this paper is to compare OS forensics tools by evaluating their ease of use, functionality, performance, and product support and documentation. This research will provide a brief comparative analysis of two widely used OS forensic tools-OSForensics and autopsy based on various contradictory factors.
APA, Harvard, Vancouver, ISO, and other styles
25

Mualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.

Full text
Abstract:
Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti dalam keadan aktif berdasarkan pedoman SNI 27037:2014 sesuai acuan kerangka kerja Common Phases of Computer Forensics Investigation Models untuk di implementasikan ke dalam dokumen Chain of Custody. Hasil penelitian ini berupa hasil analisis video rekaman kamera CCTV tentang karakteristik bukti digital dan informasi metadata yang digunakan untuk memberikan penjelasan komprehensif secara terstruktur serta acuan pengelolaan informasi data yang didapat dari hasil investigasi digital forensik yang dapat dipertanggungjawabkan dalam persidangan. Kata kunci: Bukti Digital, Live Forensik, Metadata, Kamera CCTV, Chain of Custody. Abstract Conventional crimes that are recorded on CCTV (Closed Circuit Television) cameras are increasingly being found in society, every crime that commits certain crimes will be in accordance with statutory regulations. CCTV cameras have an important role in security, many of which are recorded by CCTV cameras used as digital evidence. The challenge is how the techniques required for special handling, digital forensics in searching for digital evidence of CCTV camera footage using the live forensic method, namely when the evidence is in an active state based on the latest SNI 27037: 2014 according to the framework reference Common Phases of Computer Forensics Investigation Models for in implement it into the Chain of Custody document. These results of this research are in the form of analysis of CCTV camera video recordings about the characteristics of digital evidence and metadata information used to provide a structured comprehensive explanation and reference data management information obtained from the results of digital forensic investigations that can be accounted for in court. Keywords: Digital Evidence, Live Forensic, Metadata, CCTV Camera, Chain of Custady.
APA, Harvard, Vancouver, ISO, and other styles
26

Alotaibi, Fahad Mazaed, Arafat Al-Dhaqm, and Yasser D. Al-Otaibi. "A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field." Computational Intelligence and Neuroscience 2022 (February 28, 2022): 1–13. http://dx.doi.org/10.1155/2022/8002963.

Full text
Abstract:
The Drone Forensics (DRFs) field is a branch of digital forensics, which involves the identification, capture, preservation, reconstruction, analysis, and documentation of drone incidents. Several models have been proposed in the literature for the DRF field, which generally discusses DRF from a reactive forensic perspective; however, the proactive forensic perspective is missing. Therefore, this paper proposes a novel forensic readiness framework called Drone Forensics Readiness Framework (DRFRF) using the design science method. It consists of two stages: (i) proactive forensic stage and (ii) reactive forensic stage. It considers centralized logging of all events of all the applicants within the drone device in preparation for an examination. It will speed up gathering data when an investigation is needed, permitting the forensic investigators to handle the examination and analysis directly. Additionally, digital forensics analysts can increase the possible use of digital evidence while decreasing the charge of performing forensic readiness. Thus, both the time and cost required to perform forensic readiness could be saved. The completeness, logicalness, and usefulness of DRFRF were compared to those of other models already existing in the DRF domain. The results showed the novelty and efficiency of DRFRF and its applicability to the situations before and after drone incidents.
APA, Harvard, Vancouver, ISO, and other styles
27

Chandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (January 2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.

Full text
Abstract:
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also contributes the aspect of incorporation of anti-forensic techniques in attack graph which will help in analysis of the diverse possibilities of attack path deviations and thus aids in recommendation of various defense strategies for better security. To the best of our knowledge, this is the first time network anti-forensics has been fully discussed and the attack graphs are employed to analyze the network attacks. The experimental analysis of anti-forensic techniques using attack graphs were conducted in the proposed test-bed which helped to evaluate the model proposed and suggests preventive measures for the improvement of security of the networks.
APA, Harvard, Vancouver, ISO, and other styles
28

Ekhande, Sonali, Uttam Patil, and Kshama Vishwanath Kulhalli. "Review on effectiveness of deep learning approach in digital forensics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (October 1, 2022): 5481. http://dx.doi.org/10.11591/ijece.v12i5.pp5481-5592.

Full text
Abstract:
<p><span>Cyber forensics is use of scientific methods for definite description of cybercrime activities. It deals with collecting, processing and interpreting digital evidence for cybercrime analysis. Cyber forensic analysis plays very important role in criminal investigations. Although lot of research has been done in cyber forensics, it is still expected to face new challenges in near future. Analysis of digital media specifically photographic images, audio and video recordings are very crucial in forensics This paper specifically focus on digital forensics. There are several methods for digital forensic analysis. Currently deep learning (DL), mainly convolutional neural network (CNN) has proved very promising in classification of digital images and sound analysis techniques. This paper presents a compendious study of recent research and methods in forensic areas based on CNN, with a view to guide the researchers working in this area. We first, defined and explained preliminary models of DL. In the next section, out of several DL models we have focused on CNN and its usage in areas of digital forensic. Finally, conclusion and future work are discussed. The review shows that CNN has proved good in most of the forensic domains and still promise to be better.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
29

Haryanto, Eri, and Imam Riadi. "Forensik Internet Of Things pada Device Level berbasis Embedded System." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (December 2, 2019): 703. http://dx.doi.org/10.25126/jtiik.2019661828.

Full text
Abstract:
<p>Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya lebih banyak pada level jaringan dan level cloud server perangkat IoT. Pada penelitian ini dibangun environment perangkat IoT berupa prototype smart home sebagai media penelitian dan kajian tentang forensik level device. Pada penelitian ini digunakan analisis model forensik yang meliputi collection, examination, analysis, dan reporting dalam investigasi forensik untuk menemukan bukti digital. Penelitian ini berhasil mengungkap benar-benar ada serangan berupa injeksi malware terhadap perangkat IoT yang memiliki sistem operasi Raspbian, Fedberry dan Ubuntu Mate. Pengungkapan fakta kasus mengalami kesulitan pada perangkat IoT yang memiliki sistem operasi Kali Linux. Ditemukan 1 IP Address komputer penyerang yang diduga kuat menanamkan malware dan mengganggu sistem kerja perangkat IoT.</p><p><em><strong>Abstract</strong></em></p><p class="Abstract"><em>The Internet of Things (IoT) is an smart device that has interconnection with global internet networks. Investigating cases involving IoT devices will be a challenge for forensic investigators. The diversity of types of equipment and technology will create new challenges for forensic investigators. In this study focused on forensics at the IoT device's internal device level, there have not been many similar research that focuses on forensic analysis of IoT devices at the device level. Previous research has been done more at the network level and cloud level of IoT device's. In this study an IoT environment was built a smart home prototype as a object for research and studies on forensic level devices. This study, using forensic model analysis which includes collection, examination, analysis, and reporting in finding digital evidence. This study successfully revealed that there was really an attack in the form of malware injection against IoT devices that have Raspbian, Fedberry and Ubuntu Mate operating systems. Disclosure of the fact that the case has difficulties with IoT devices that have the Kali Linux operating system. Found 1 IP Address of an attacker's computer that is allegedly strongly infusing malware and interfering with the work system of IoT devices.</em></p><p><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
30

Jäger, Richard. "New Perspectives for Whole Genome Amplification in Forensic STR Analysis." International Journal of Molecular Sciences 23, no. 13 (June 25, 2022): 7090. http://dx.doi.org/10.3390/ijms23137090.

Full text
Abstract:
Modern PCR-based analytical techniques have reached sensitivity levels that allow for obtaining complete forensic DNA profiles from even tiny traces containing genomic DNA amounts as small as 125 pg. Yet these techniques have reached their limits when it comes to the analysis of traces such as fingerprints or single cells. One suggestion to overcome these limits has been the usage of whole genome amplification (WGA) methods. These methods aim at increasing the copy number of genomic DNA and by this means generate more template DNA for subsequent analyses. Their application in forensic contexts has so far remained mostly an academic exercise, and results have not shown significant improvements and even have raised additional analytical problems. Until very recently, based on these disappointments, the forensic application of WGA seems to have largely been abandoned. In the meantime, however, novel improved methods are pointing towards a perspective for WGA in specific forensic applications. This review article tries to summarize current knowledge about WGA in forensics and suggests the forensic analysis of single-donor bioparticles and of single cells as promising applications.
APA, Harvard, Vancouver, ISO, and other styles
31

Long, Chen, and Zhang Qing. "Forensic Analysis to China’s Cloud Storage Services." International Journal of Machine Learning and Computing 5, no. 6 (December 2015): 467–70. http://dx.doi.org/10.18178/ijmlc.2015.5.6.554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Keltus, Kelvin. "Forensic Science in The Nigerian Criminal Justice System." Journal of Criminology Sociology and Law 2, no. 4 (May 17, 2022): 42–49. http://dx.doi.org/10.52096/jscl.2.4.5.

Full text
Abstract:
Abstract This research aimed at assessing the application and impact of forensic science in the Nigerian criminal justice system by making reference to certain components of forensics that are relevant to the criminal justice system. Such components include, Deoxyribonucleic Acid (DNA) analysis, Fingerprint analysis, Polygraph test, Ballistics, Forensic anthropology, Forensic pathology and Computer forensics. In the course of this research, it was found that establishing certain types of evidence such as fingerprint impressions and DNA, against accused persons was difficult due to the absence of sophisticated forensic laboratories and this hindered conviction of such persons. In view of this problem, this research recommends for proper training of law enforcement agencies in terms of how crimes and crime scenes are handled and also the establishment of sophisticated forensic labs where evidence and accused persons can be tested in order to determine their guilt or innocence, thereby easing the administration of justice in Nigeria. Keywords: forensic science, Nigerian criminal justice
APA, Harvard, Vancouver, ISO, and other styles
33

Savenko, A. S. "Formation of Intellectual Property Forensics in the System of the Russian Ministry of Justice." Theory and Practice of Forensic Science 15, no. 3 (October 23, 2020): 98–105. http://dx.doi.org/10.30764/1819-2785-2020-3-98-105.

Full text
Abstract:
The article analyses legal regulations of a forensic investigation into intellectual property o jects regarding the appointment of examinations of trademarks and service marks. The matter of necessity of specialized knowledge to conduct such investigations is addressed as well as current expert and judicial practice in this field. The author notes that forensic analysis of trade and service marks should be carried out as a part of a comprehensive examination in complex cases. The investigation should also include a sociological study.It is shown that the training of state forensic experts in the Russian Ministry of Justice system for intellectual property forensics, among other things to assess its value, will provide fully competent, unbiased, and independent experts and specialists in the field. The author proposes acknowledging and adding to the List of types of forensic examinations conducted in the Federal budget forensic institutions of the Russian Ministry of Justice the new type of forensic examinations – “Intellectual Property Forensics”.
APA, Harvard, Vancouver, ISO, and other styles
34

Fatima, Fatima Fatima. "Forensic Profiling." International Journal for Electronic Crime Investigation 4, no. 2 (March 23, 2020): 12. http://dx.doi.org/10.54692/ijeci.2020.040256.

Full text
Abstract:
This review paper brings out technical and legal association between profiling and forensic science. It emphasizes on trace evidences used as valuable information in perspective of forensic science and criminal justice system. The aim of forensic profiling is to interpret and investigate with reasoning purposes. It explains available forms of data, data processing methods and technologies, and obstacles to data treatment. Proceeding with reconstruction process that formulates a possible hypothesis of profile, different forms of forensic profiling with judicial perspective are discussed. Other factors such as crime prepetition, crime series, and tactical, operational and strategic analysis etc. that can help in developing of profiles are also argued. It distinguishes the profiles significance into new technologies of DNA databases, digital image forensics, 3D and CCTV surveillance cameras, forensic drug profiling and intelligence based expertise centers. Other fields related to security such as detection, risk analysis and surveillance are discussed in profiling perspective
APA, Harvard, Vancouver, ISO, and other styles
35

Hani Roslee, Nurul Adhlina, and Nurul Hidayah Bt Ab Rahman. "A Visualization Approach to Analyze Android Smartphone Data." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 184. http://dx.doi.org/10.30630/joiv.2.3-2.137.

Full text
Abstract:
This study aims to design and develop an interactive system that can visualize evidence collected from Android smartphone data. This project is developing to support forensic investigator in investigating the security incidents particularly involving Android smartphone forensic data. The used of smartphone in crime was widely recognized. Several types of personnel information are stored in their smartphones. When the investigator analyses the image data of the smartphone, the investigator can know the behaviour of the smartphone’s owner and his social relationship with other people. The analysis of smartphone forensic data is cover in mobile device forensic. Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence from a mobile device under forensically sound condition. The digital investigation model used in this project is the model proposed by United States National Institute of Justice (NIJ) which consists four phases, which are collection phase, examination phase, analysis phase and presentation phase. This project related with analysis phase and presentation phase only. This paper introduces Visroid, a new tool that provides a suite of visualization for Android smartphone data.
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Yu, and Pei Yu Liu. "Construction and Analysis of Website Intrusion Forensics Model." Applied Mechanics and Materials 687-691 (November 2014): 2748–51. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2748.

Full text
Abstract:
According to the website security and judicial forensics demands, a new Website Intrusion Forensics Model is proposed foe research. The model can discovery the website intrusion and forensic in time. This paper first describes the overall structure of the model, then according to the various types of intrusion websites. Put forward a comprehensive and detailed design plan about Data acquisition, transmission, preprocessing, storage, analysis, data control and user view module.
APA, Harvard, Vancouver, ISO, and other styles
37

Addo-Sampong, Rosemond O. "Application Information for Forensic Analysis Considerations for Registered Host / Users / Device Name & Bearer Tokens." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 15, 2022): 167–72. http://dx.doi.org/10.22624/aims/crp-bk3-p27.

Full text
Abstract:
As the dependence on digital information and the Internet continues to grow, it changes the way of computer crime. The number of computer crimes increases dramatically in recent years and investigators have been facing the difficulty of admissibility of digital evidence. To solve this problem, we must collect evidence by digital forensics techniques and analyze the digital data or recover the damaged data. One place to collect evidence is from application software. This paper seeks to find out how to collect, store and analyze application information for forensic purposes. This is also to determine gaps in current research works and proffer recommendations on what future works relate to application forensics. Keywords: Digital Forensics, Evidence, Application Information, Analysis, Registered Host BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Rosemond O. Addo-Sampong (2022): Application Information for Forensic Analysis (Considerations for Registered Host / Users / Device Name & Bearer Tokens) Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 167-172 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P27
APA, Harvard, Vancouver, ISO, and other styles
38

Asnis, A. Ya, M. A. Ivanova, and Sh N. Khaziev. "Forensic Valuation of Intellectual Property." Theory and Practice of Forensic Science 14, no. 3 (October 23, 2019): 40–45. http://dx.doi.org/10.30764/1819-2785-2019-14-3-40-45.

Full text
Abstract:
Valuation of objects of intellectual property can be important when considering civil disputes, criminal cases of copyright and related rights infringements, criminal bankruptcies, cases of administrative offenses (violations of copyright and related rights, inventor’s and patent rights). At present, there is no generally accepted and accessible methodology of forensic valuation of intellectual property items.The main aspects of the forensic valuation of intellectual property are reviewed. It is shown that when assessing the value of intellectual property special knowledge should be applied in the field of forensic merchandising expertise, forensic economics, as well as other kinds and types of forensic expertise according to the characteristics of the intellectual property in question: forensic trace evidence analysis, computer forensics, forensic linguistics, forensic materials analysis, etc. It is necessary to develop and implement a new type of forensic examination in the forensic institutions of the Ministry of Justice of the Russian Federation - forensic examination of intellectual property which will also include the value assessment of such objects.
APA, Harvard, Vancouver, ISO, and other styles
39

Daniels, Samuel Opoku. "Mobile/Telephone Contacts and Calls In Forensics Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 315–20. http://dx.doi.org/10.22624/aims/crp-bk3-p50.

Full text
Abstract:
When tackling and preventing crime, the analysis of mobile or tele phone data, particularly contacts and calls among crime actors plays a significant role in both civil and criminal cases. Forensic analyst and investigators are able to reconstruct illegal and suspicious activities between specific individuals on the basis of the relationships connecting those individuals. This paper discusses mobile / tele phone contacts and calls in forensic analysis. By analysing the contacts and call log data among individuals related to a criminal activity, forensic analysts and investigators get a proper perspective about a particular criminal network. It is worth mentioning that not all mobile phones are smartphones. But they all have the same ability to store the names and phone numbers as well as call logs. When dealing with a digital device such as a mobile phone, the method used to extract data from it must have little impact on the memory for the evidence to be admissible in court. As such, the methods used to acquire data from a mobile phone will play an important part in an investigation which requires evidence to be extracted from a mobile phone. The investigator must be sure that the information acquired actually reflects that which is stored in the phone, and that the procedures used do not adversely affect the integrity of the information, or any other data stored in the device (McCarthy, 2005). Mobile or tele phone contacts and call data is important to law enforcement in tracking illegal activities and providing evidence for dismissals or acquittals. Keywords: Mobile, Telephone, Calls, Threats, Forensic Analysis, Cyber Security, BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Samuel Opoku Daniels (2022): Mobile/Telephone Contacts and Calls In Forensics Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 315-320 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P50
APA, Harvard, Vancouver, ISO, and other styles
40

Shree, Barkha, and Parneeta Dhaliwal. "Behavioural Evidence Analysis." International Journal of Digital Crime and Forensics 13, no. 5 (September 2021): 20–42. http://dx.doi.org/10.4018/ijdcf.20210901.oa2.

Full text
Abstract:
Recent developments in digital forensics (DF) have emphasized that along with inspection of digital evidence, the study of behavioural clues based on behavioural evidence analysis (BEA) is vital for accurate and complete criminal investigation. This paper reviews the existing BEA approaches and process models and concludes the lack of standardisation in the BEA process. The research comprehends that existing BEA methodologies are restricted to specific characteristics of the forensic domain in question. To address these limitations, the paper proposes a standardised approach detailing the step-by-step implementation of BEA in the DF process. The proposed model presents a homogenous technique that can be practically applied to real-life cases. This standard BEA framework classifies digital evidence into categories to decipher associated offender characteristics. Unlike existing models, this new approach collects evidence from diverse sources and leaves no aspect unattended while probing criminal behavioural cues, thus facilitating its applicability across varied forensic domains.
APA, Harvard, Vancouver, ISO, and other styles
41

McDonald, Jessica, and Donald C. Lehman. "Forensic DNA Analysis." American Society for Clinical Laboratory Science 25, no. 2 (April 2012): 109–13. http://dx.doi.org/10.29074/ascls.25.2.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Gehrig, Christian, and Anne Teyssier. "Forensic DNA Analysis." CHIMIA International Journal for Chemistry 56, no. 3 (March 1, 2002): 71–73. http://dx.doi.org/10.2533/000942902777680784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kinard, W. Frank. "Nuclear Forensic Analysis." Journal of Forensic Sciences 51, no. 1 (January 2006): 203. http://dx.doi.org/10.1111/j.1556-4029.2005.00040.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Shariati, Mohammad, Ali Dehghantanha, and Kim-Kwang Raymond Choo. "SugarSync forensic analysis." Australian Journal of Forensic Sciences 48, no. 1 (April 8, 2015): 95–117. http://dx.doi.org/10.1080/00450618.2015.1021379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

McCord, Bruce R., Quentin Gauthier, Sohee Cho, Meghan N. Roig, Georgiana C. Gibson-Daw, Brian Young, Fabiana Taglia, et al. "Forensic DNA Analysis." Analytical Chemistry 91, no. 1 (November 28, 2018): 673–88. http://dx.doi.org/10.1021/acs.analchem.8b05318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Quist, Albert. "Digital Forensic Challenges in Internet of Things (IoT)." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 23, 2022): 119–24. http://dx.doi.org/10.22624/aims/crp-bk3-p20.

Full text
Abstract:
With emerging technology and the connection of electronic devices to the internet, Internet of Things (IoT) has become part of human life. From the development of smartphones to smartwatches and smart-homes, electronic devices now have the capability of performing human activities or aiding humans in performing activities such as turning hall lights on or off with their voice. Although a large number of people use these devices for the greater good, a few individuals or group of people hide behind these devices to perform malicious activities. In order to apprehend and prosecute perpetuators who hide behind smart devices for evil gains, forensic examinations or investigations must be conducted. This review aims to identify digital forensic challenges in IoT. The inclusion criteria for this paper were international journals, articles, conference papers and case studies published from 2019 to 2022. Thematic analysis was used to analyze and synthesis the literature. Three themes emerged from the analysis; automated compromised smart-home tracer; data volatility and reconstruction; IoT forensic investigation framework. This integrative review combines evidence of digital forensic challenges in diverse IoT devices. Keyword IoT forensics, IoT challenges, Digital forensics, Smart-home forensics.
APA, Harvard, Vancouver, ISO, and other styles
47

Zuhriyanto, Ikhsan, Anton Yudhana, and Imam Riadi. "Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 5 (October 30, 2020): 829–36. http://dx.doi.org/10.29207/resti.v4i5.2152.

Full text
Abstract:
Current crime is increasing, one of which is the crime of using social media, although no crime does not leave digital evidence. Twitter application is a social media that is widely used by its users. Acts of crime such as fraud, insults, hate speech, and other crimes lately use many social media applications, especially Twitter. This research was conducted to find forensic evidence on the social media Twitter application that is accessed using a smartphone application using the Digital Forensics Research Workshop (DFRWS) method. These digital forensic stages include identification, preservation, collection, examination, analysis, and presentation in finding digital evidence of crime using the MOBILedit Forensic Express software and Belkasoft Evidence Center. Digital evidence sought on smartphones can be found using case scenarios and 16 variables that have been created so that digital proof in the form of smartphone specifications, Twitter accounts, application versions, conversations in the way of messages and status. This study's results indicate that MOBILedit Forensic Express digital forensic software is better with an accuracy rate of 85.75% while Belkasoft Evidence Center is 43.75%.
APA, Harvard, Vancouver, ISO, and other styles
48

Matialu, Dewi D. L., Erwin G. Kristanto, and Johannis F. Mallo. "Proteomics sebagai Metode Identifikasi dalam Ilmu Kedokteran Forensik." Jurnal Biomedik:JBM 14, no. 1 (March 31, 2022): 61. http://dx.doi.org/10.35790/jbm.v14i1.37343.

Full text
Abstract:
Abstract: DNA analysis is the gold standard in forensic identification, however there are some circumstances in which DNA has been degraded or uninformative that make proteomics has the potential to be an alternative method of forensic identification. This study used a literature review method using four databases (Pubmed, ScienceDirect, Proquest, and SpringerLink). The keywords used in the data search are Proteomics OR Analysis Proteome OR Protein-based Identification AND Forensic Identification. The data selection process using inclusion and exclusion criteria, resulted in 10 literatures (research article). There were 10 literatures that examine the implementation of proteomics as a method of identification in forensic cases using various samples such as hair, bone, muscle, blood plasma, body fluids, stomach content, organ fragments, vomit traces, nail scrapings, and fingerprints with significant research results. The development & implementation of proteomics as a method of forensic identification is currently undergoing several developments using spectrometry (MS) technology. With various significant research results, proteomics has great potential not only in identifying individuals, but in many other ways in forensic medicine.Keywords: Proteomics; Analysis Proteome; Protein-based Identification; Forensic IdentificationAbstrak: Analisis DNA merupakan gold standard dalam identifikasi forensik, tetapi ada beberapa keadaan dimana DNA sudah terdegradasi atau tidak informatif yang menjadikan proteomics berpotensi menjadi sebuah metode alternatif dalam identifikasi forensik. Penelitian ini menggunakan metode literature review dengan pencarian data menggunakan empat database (Pubmed, ScienceDirect, Proquest, dan SpringerLink). Kata kunci yang digunakan dalam pencarian adalah Proteomics OR Analysis Proteome OR Protein-based Identification AND Forensic Identification. Proses seleksi data dengan menggunakan kriteria inklusi dan ekslusi mendapatkan 10 literature (research article). Terdapat 10 literature yang meneliti tentang implementasi proteomics dalam proses identifikasi pada kasus forensik dengan menggunakan berbagai sampel seperti rambut, tulang, otot, plasma darah, cairan tubuh, zat dalam perut, fragmen organ, jejak muntah, kerokan kuku, dan sidik jari dengan hasil penelitian yang signifikan. Perkembangan & implementasi proteomics sebagai metode identifikasi forensik saat ini sudah mengalami beberapa perkembangan dengan menggunakan teknologi mass spectrometry (MS). Dengan berbagai hasil penelitian yang signifikan, maka proteomics memiliki potensi yang besar tidak hanya dalam mengidentifikasi individu, tetapi dalam berbagai hal lain dalam ilmu kedokteran forensik.Kata Kunci: Proteomik; Analisis Proteom; Identifikasi Berbasis Protein; Identifikasi Forensik
APA, Harvard, Vancouver, ISO, and other styles
49

Asiedu, Francis. "Packet Analysis for Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 20, 2022): 91–98. http://dx.doi.org/10.22624/aims/crp-bk3-p15.

Full text
Abstract:
If the packet characteristics acquired are sufficiently detailed, packet analysis is a common forensic approach in network forensics that can replay the whole network traffic for a specified time period. This can be used to find evidence of illicit online activity such as data breaches, unauthorized website access, malware infection, and infiltration attempts, as well as to reproduce image files, documents, email attachments, and other material sent over the network. This paper covers a comprehensive assessment of the usage of packet analysis, including deep packet inspection, in network forensics, as well as a discussion of AI-powered packet analysis methodologies with sophisticated network traffic classification and pattern recognition. Keywords: Cybersecurity; Network Security; Traffic Analysis; Deep Inspection; Intrusion Detection; Network Forensics
APA, Harvard, Vancouver, ISO, and other styles
50

Díez-Pascual, Ana M., Daniel Lechuga Cruz, and Alba Lomas Redondo. "Advanced Carbon-Based Polymeric Nanocomposites for Forensic Analysis." Polymers 14, no. 17 (August 31, 2022): 3598. http://dx.doi.org/10.3390/polym14173598.

Full text
Abstract:
Nanotechnology is a powerful tool and fast-growing research area in many novel arenas, ranging from biomedicine to engineering and energy storage. Nanotechnology has great potential to make a significant positive contribution in forensic science, which deals with the identification and investigation of crimes, finding relationships between pieces of evidence and perpetrators. Nano-forensics is related to the development of nanosensors for crime investigations and inspection of terrorist activity by analyzing the presence of illicit drugs, explosives, toxic gases, biological agents, and so forth. In this regard, carbon nanomaterials have huge potential for next-generation nanosensors due to their outstanding properties, including strength combined with flexibility, large specific surface area, high electrical conductivity, and little noise. Moreover, their combination with polymers can provide nanocomposites with novel and enhanced performance owed to synergy between the composite components. This review concisely recapitulates up-to-date advances in the development of polymer composites incorporating carbon-based nanomaterials for forensic science. The properties of the different carbon nanomaterials, several methods used to analyze functional polymeric nanocomposites, and their applications in forensic investigation are discussed. Furthermore, present challenges and forthcoming outlooks on the design of new polymer/carbon nanomaterial composites for crime prevention are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography