|
|
|
Saad Said Alqahtany and Toqeer Ali Syed
In the domain of computer forensics, ensuring the integrity of operations like preservation, acquisition, analysis, and documentation is critical. Discrepancies in these processes can compromise evidence and lead to potential miscarriages of justice. To ...
ver más
|
|
|
|
|
|
|
Daniel Spiekermann and Jörg Keller
While network forensics has matured over the decades and even made progress in the last 10 years when deployed in virtual networks, network forensics in fog and edge computing is still not progressed to that level despite the now widespread use of these ...
ver más
|
|
|
|
|
|
|
Christos Karagiannis and Kostas Vergidis
Fighting crime in cyberspace requires law enforcement authorities to immerse in a digital ocean of vast amount of information and also to acquire and objectify the evidence of criminal activity. Handling digital evidence is a complex and multifaceted pro...
ver más
|
|
|
|
|
|
|
Diego Renza, Jaime Andres Arango and Dora Maria Ballesteros
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ...
ver más
|
|
|
|
|
|
|
Lei Chen, Wenjia Li and Rami J. Haddad
-
|
|
|
|