4.0 Article

Detecting the software usage on a compromised system: A triage solution for digital forensics

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Developing Software Signature Search Engines Using Paragraph Vector Model: A Triage Approach for Digital Forensics

Somayeh Soltani et al.

Summary: With the advancement of information and communication technology, digital crimes have become more prevalent. This paper introduces a software signature search engine (S3E) to identify software on the system, aiming to address the challenge faced by digital forensic investigators. Experimental results demonstrate the good performance of S3E models on controlled systems and pseudo-real systems.

IEEE ACCESS (2021)

Article Medicine, Legal

Inter-regional digital forensic knowledge management: needs, challenges, and solutions

Eoghan Casey et al.

Summary: The increasing demand for digital evidence in criminal investigations has driven forensic capabilities closer to the crime scene, creating a need to balance decentralization with knowledge management and sharing. This work presents an inter-regional knowledge management solution to improve the quality, reliability, and efficiency of digital forensic capabilities, addressing multiple forms of knowledge and producers and consumers of knowledge in different regions.

JOURNAL OF FORENSIC SCIENCES (2021)

Article Multidisciplinary Sciences

An Ontology Based on the Timeline of Log2timeline and Psort Using Abstraction Approach in Digital Forensics

Sandeepak Bhandari et al.

SYMMETRY-BASEL (2020)

Article Computer Science, Information Systems

Sentiment Analysis in a Forensic Timeline With Deep Learning

Hudan Studiawan et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Timeline2GUI: A Log2Timeline CSV parser and training scenarios

Mark Debinski et al.

DIGITAL INVESTIGATION (2019)

Article Computer Science, Information Systems

Neural embedding-based indices for semantic search

Fatemeh Lashkari et al.

INFORMATION PROCESSING & MANAGEMENT (2019)

Article Computer Science, Information Systems

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts

Doowon Jeong et al.

DIGITAL INVESTIGATION (2019)

Article Computer Science, Information Systems

A multilayered semantic framework for integrated forensic acquisition on social media

Humaira Arshad et al.

DIGITAL INVESTIGATION (2019)

Article Computer Science, Information Systems

FbHash: A New Similarity Hashing Scheme for Digital Forensics

Donghoon Chang et al.

DIGITAL INVESTIGATION (2019)

Article Computer Science, Information Systems

Event reconstruction using temporal pattern of file system modification

Somayeh Soltani et al.

IET INFORMATION SECURITY (2019)

Article Computer Science, Information Systems

HDFS file operation fingerprints for forensic investigations

Mariam Khader et al.

DIGITAL INVESTIGATION (2018)

Article Computer Science, Software Engineering

Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data

Darren Quick et al.

SOFTWARE-PRACTICE & EXPERIENCE (2017)

Review Multidisciplinary Sciences

Methods and Tools of Digital Triage in Forensic Context: Survey and Future Directions

Vacius Jusas et al.

SYMMETRY-BASEL (2017)

Article Computer Science, Information Systems

An ontology-based approach for the reconstruction and analysis of digital incidents timelines

Yoan Chabot et al.

DIGITAL INVESTIGATION (2015)

Article Computer Science, Information Systems

Automated inference of past action instances in digital investigations

Joshua I. James et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)

Article Computer Science, Information Systems

OpenLV: Empowering investigators and first-responders in the digital forensics process

Timothy Vidas et al.

DIGITAL INVESTIGATION (2014)

Article Computer Science, Information Systems

Clustering digital forensic string search output

Nicole L. Beebe et al.

DIGITAL INVESTIGATION (2014)

Article Computer Science, Information Systems

A practical and robust approach to coping with large volumes of data submitted for digital forensic examination

Adrian Shaw et al.

DIGITAL INVESTIGATION (2013)

Article Computer Science, Information Systems

Performance analysis of Bayesian networks and neural networks in classification of file system activities

Muhammad Naeem Ahmed Khan

COMPUTERS & SECURITY (2012)

Article Computer Science, Information Systems

Content triage with similarity digests: The M57 case study

Vassil Roussev et al.

DIGITAL INVESTIGATION (2012)

Article Computer Science, Information Systems

An automated timeline reconstruction approach for digital forensic investigations

Christopher Hargreaves et al.

DIGITAL INVESTIGATION (2012)

Article Computer Science, Information Systems

Detecting data theft using stochastic forensics

Jonathan Grier

DIGITAL INVESTIGATION (2011)

Article Computer Science, Information Systems

Computer forensic timeline visualization tool

Jens Olsson et al.

DIGITAL INVESTIGATION (2009)

Article Computer Science, Information Systems

An information-theoretic perspective of tf-idf measures

A Aizawa

INFORMATION PROCESSING & MANAGEMENT (2003)