Boundary Conditions for the Digital Forensic Use of Electronic Evidence and The Need for Forensic Counter-Analysis

Author(s):  
Michael M. Losavio ◽  
Musa Hindi ◽  
Roman Yampolskiy ◽  
Deborah Wilson Keeling
Author(s):  
Ming Xu ◽  
Hong-Rong Yang ◽  
Ning Zheng

It is a pivotal task for a forensic investigator to search a hard disk to find interesting evidences. Currently, most search tools in digital forensic field, which utilize text string match and index technology, produce high recall (100%) and low precision. Therefore, the investigators often waste vast time on huge irrelevant search hits. In this chapter, an improved method for ranking of search results was proposed to reduce human efforts on locating interesting hits. The K-UIH (the keyword and user interest hierarchies) was constructed by both investigator-defined keywords and user interest learnt from electronic evidence adaptive, and then the K-UIH was used to re-rank the search results. The experimental results indicated that the proposed method is feasible and valuable in digital forensic search process.


2016 ◽  
Vol 19 (2) ◽  
pp. 723-740 ◽  
Author(s):  
Darren Quick ◽  
Kim-Kwang Raymond Choo

2018 ◽  
Vol 2 (02) ◽  
pp. 18-23
Author(s):  
Mohammad Hafiz Hersyah

Over the past decades, practitioners and researchers have made remarkable achievements in digital forensic. The abilities to conquer major technical obstacles are bestowing practitioners greater access to digital evidence. Sophisticated forensic techniques and tools are being developed to assist forensic acquisition and extraction of volatile data, inspection of remote repositories system and analysis of network traffic. Computer forensic is a comprehensive work that based on several attributes that are : objectivity, relevance and legitimacy to compose a system model that projected to be an electronic evidence forensic system. Latest studies show that the rapid growing of cloud computing facilities usage that has enable various improvements as part of the innovation process at organisations. Information systems are in frequently exposed to various types of threats which able to trigger different types of bad consequences as more and more information stored, problems arise especially about security information technology risk aspects. Keywords—computer forensic, cloud computing, electronic evidence forensic system, security, information technology risk, information system


Author(s):  
Mohammad Hafiz Hersyah

Over the past decades, practitioners and researchers have made remarkable achievements in digital forensic. The abilities to conquer major technical obstacles are bestowing practitioners greater access to digital evidence. Sophisticated forensic techniques and tools are being developed to assist forensic acquisition and extraction of volatile data, inspection of remote repositories system and analysis of network traffic. Computer forensic is a comprehensive work that based on several attributes that are : objectivity, relevance and legitimacy to compose a system model that projected to be an electronic evidence forensic system. Latest studies show that the rapid growing of cloud computing facilities usage that has enable various improvements as part of the innovation process at organisations. Information systems are in frequently exposed to various types of threats which able to trigger different types of bad consequences as more and more information stored, problems arise especially about security information technology risk aspects.


Author(s):  
John W. Coleman

In the design engineering of high performance electromagnetic lenses, the direct conversion of electron optical design data into drawings for reliable hardware is oftentimes difficult, especially in terms of how to mount parts to each other, how to tolerance dimensions, and how to specify finishes. An answer to this is in the use of magnetostatic analytics, corresponding to boundary conditions for the optical design. With such models, the magnetostatic force on a test pole along the axis may be examined, and in this way one may obtain priority listings for holding dimensions, relieving stresses, etc..The development of magnetostatic models most easily proceeds from the derivation of scalar potentials of separate geometric elements. These potentials can then be conbined at will because of the superposition characteristic of conservative force fields.


1981 ◽  
Vol 64 (11) ◽  
pp. 18-26 ◽  
Author(s):  
Tetsuya Nomura ◽  
Nobuhiro Miki ◽  
Nobuo Nagai

2018 ◽  
Vol 103 (9) ◽  
pp. 1019-1038 ◽  
Author(s):  
Lin Wang ◽  
Bradley P. Owens ◽  
Junchao (Jason) Li ◽  
Lihua Shi

2009 ◽  
Author(s):  
Sabrina Volpone ◽  
Cristina Rubino ◽  
Ari A. Malka ◽  
Christiane Spitzmueller ◽  
Lindsay Brown

2008 ◽  
Author(s):  
Silke Atmaca ◽  
Antje Hollander ◽  
Wolfgang Prinz

Sign in / Sign up

Export Citation Format

Share Document