Una raccolta di strumenti fondamentali per l’analisi forense.
A Lessons Learned: Repository for Computer Forensics
A Ten Step Process for Forensic Readiness
An Evaluation of Image Based Steganography Methods
An Examination of Digital Forensic Models
An Historical Perspective of Digital Evidence- A Forensic Scientist’s View
Analyzing the Difficulties in Backtracing Onion Router Traffic
Blind Steganography Detection Using a Computational Immune System- A Work in Progress
Computer Forensic Analysis in a Virtual Environment
Cyber Forensics – A Military Operations Perspective
Decoy Systems – A New Player in Network Security and Computer Incident Response
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Digital Evidence – The Moral Challenge
Digital Forensic Analysis of E-Mails- A Trusted E-Mail Protocol
Dynamic Time & Date Stamp Analysis
Error, Uncertainty, and Loss in Digital Evidence
Examining the Encryption Threat
Exploiting the Rootkit Paradox with Windows Memory Analysis
Finite State Machine Analysis of a Blackmail Investigation
Forensic Relative Strength Scoring – ASCII and Entropy Scoring
Forensics and SIM cards – an Overview
Forensics and the GSM mobile telephone system
Formalising Event Time Bounding in Digital Investigations
Google Desktop as a Source of Digital Evidence
Hidden Disk Areas – HPA and DCO
IJDE – Getting Physical with the Digital Investigation Process
IJDE – MFP- The Mobile Forensic Platform
IJDE – Mobile Phone Forensics Tool Testing- A Database Driven Approach
Modeling of Post-Incident Root Cause Analysis
New Accounting Reform Laws Push For Technology-Based Document Retention Practices
NIJ Digital Evidence for Law Enforcement
NIST CFTT – Testing Disk Imaging Tools
Practical Approaches to Recovering Encrypted Digital Evidence
Proving the Integrity of Digital Evidence with Time
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
The Debtor’s Digital Reckonings
The Trojan Made Me Do It – A First Step in Statistical Based Computer Forensics Event Reconstruction
Toward Defining the Intersection of Forensics and Information Technology
Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis