Damshenas et al., 2014 - Google Patents
A survey on digital forensics trendsDamshenas et al., 2014
- Document ID
- 1255796695884125152
- Author
- Damshenas M
- Dehghantanha A
- Mahmoud R
- Publication year
- Publication venue
- International Journal of Cyber-Security and Digital Forensics
External Links
Snippet
Digital forensic has evolved from addressing minor computer crimes to investigation of complex international cases with massive effect on the world. This paper studies the evolution of the digital forensic; its origins, its current position and its future directions. This …
- 238000009114 investigational therapy 0 abstract description 104
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Damshenas et al. | A survey on digital forensics trends | |
| Mohay | Computer and intrusion forensics | |
| US7603344B2 (en) | Methods for searching forensic data | |
| US8280905B2 (en) | Automated forensic document signatures | |
| CA2710392C (en) | Automated forensic document signatures | |
| Dezfoli et al. | Digital forensic trends and future | |
| US20070139231A1 (en) | Systems and methods for enterprise-wide data identification, sharing and management in a commercial context | |
| Khan et al. | Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction | |
| Lin et al. | Introductory computer forensics | |
| Hassan | Digital forensics basics: A practical guide using Windows OS | |
| US7941386B2 (en) | Forensic systems and methods using search packs that can be edited for enterprise-wide data identification, data sharing, and management | |
| Alenezi | Digital and cloud forensic challenges | |
| Patil et al. | Roadmap of digital forensics investigation process with discovery of tools | |
| Saharan et al. | Digital and cyber forensics: A contemporary evolution in forensic sciences | |
| Bhardwaj et al. | Practical Digital Forensics: A Guide for Windows and Linux Users | |
| WO2007075813A2 (en) | Enterprise-wide data identification, sharing and management, and searching forensic data | |
| Sansurooah | Taxonomy of computer forensics methodologies and procedures for digital evidence seizure | |
| Casey et al. | Forensic analysis | |
| Kaur | Volatile memory forensics: A legal perspective | |
| Hassan | Introduction: Understanding digital forensics | |
| Lin | Introduction to computer forensics | |
| Varalakshmi et al. | Role of cyber forensic expert in crime investigation | |
| Li et al. | Forensic computing | |
| Hughes | Anti-forensic Techniques in Windows and MaC Operating Systems | |
| Montesano | The Anti-forensics Tactics, Techniques, and Procedures (TTPs) Cybercriminals Use to Hide Electronic Evidence of Crimes |