A New Approach of Digital Forensic Model for Digital Foic rensInvestigation
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 12
Abstract
The research introduces a structured and consistent approach for digital forensic investigation. Digital forensic science provides tools, techniques and scientifically proven methods that can be used to acquire and analyze digital evidence. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court. This research focuses on a structured and consistent approach to digital forensic investigation. This research aims at identifying activities that facilitate and improves digital forensic investigation process. Existing digital forensic framework will be reviewed and then the analysis will be compiled. The result from the evaluation will produce a new model to improve the whole investigation process.
Authors and Affiliations
Inikpi O. Ademu, , Dr Chris O. Imafidon , Dr David S. Preston
On Integrating Mobile Applications into the Digital Forensic Investigative Process
What if a tool existed that allowed digital forensic investigators to create their own apps that would assist them with the evidence identification and collection process at crime scenes? First responders are responsible...
Intellectual Paradigm of Artificial Vision: from Video-Intelligence to Strong Artificial Intelligence
A new (post-Shannon) informational approach is suggested in this paper, which allows to make deep analysis of nature of the information. It was found that information could be presented as an aggregate of quantitative (p...
Technical and Perceived Usability Issues in Arabic Educational Websites
Educational websites are often used as effective communication mediums to provide useful information for students and course instructors. The current study explores the perceived usability of three top-ranked Arabic educ...
Effect of Driver Strength on Crosstalk in Global Interconnects
The Noise estimation and avoidance are becoming critical, in today’s high performance IC design. An accurate yet efficient crosstalk noise model which contains as many driver/interconnect parameters as possible, is neces...
Speculating on Speculative Execution
Threat actors continue to design exploits that specifically target physical weaknesses in processor hardware rather than more traditional software vulnerabilities. The now infamous attacks, Spector and Meltdown, ushered...