Una collezione di materiale per neofiti

Una raccolta di strumenti fondamentali per l’analisi forense.

Logo

A Lessons Learned: Repository for Computer Forensics

A Ten Step Process for Forensic Readiness

An Evaluation of Image Based Steganography Methods

An Examination of Digital Forensic Models

An Historical Perspective of Digital Evidence- A Forensic Scientist’s View

Analyzing the Difficulties in Backtracing Onion Router Traffic

Blind Steganography Detection Using a Computational Immune System- A Work in Progress

Case – Relevance Information Investigation- Binding Computer Intelligence to the Current Computer Forensic Framework

Computer Forensic Analysis in a Virtual Environment

Cyber Forensics – A Military Operations Perspective

Decoy Systems – A New Player in Network Security and Computer Incident Response

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

Digital Evidence – The Moral Challenge

Digital Forensic Analysis of E-Mails- A Trusted E-Mail Protocol

Dynamic Time & Date Stamp Analysis

Error, Uncertainty, and Loss in Digital Evidence

Examining the Encryption Threat

Exploiting the Rootkit Paradox with Windows Memory Analysis

Finite State Machine Analysis of a Blackmail Investigation

Forensic Relative Strength Scoring – ASCII and Entropy Scoring

Forensics and SIM cards – an Overview

Forensics and the GSM mobile telephone system

Formalising Event Time Bounding in Digital Investigations

Google Desktop as a Source of Digital Evidence

Hidden Disk Areas – HPA and DCO

Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques

IJDE – Getting Physical with the Digital Investigation Process

IJDE – iPod Forensics

IJDE – MFP- The Mobile Forensic Platform

IJDE – Mobile Phone Forensics Tool Testing- A Database Driven Approach

Modeling of Post-Incident Root Cause Analysis

New Accounting Reform Laws Push For Technology-Based Document Retention Practices

NIJ Digital Evidence for Law Enforcement

NIST CFTT – Testing Disk Imaging Tools

Practical Approaches to Recovering Encrypted Digital Evidence

Proving the Integrity of Digital Evidence with Time

Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method

The Debtor’s Digital Reckonings

The Trojan Made Me Do It – A First Step in Statistical Based Computer Forensics Event Reconstruction

Toward Defining the Intersection of Forensics and Information Technology

TULP2G – An Open Source Forensic Software Framework for Acquiring and Decoding Data Stored in Electronic Devices

Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis