Recovering lost and deleted information from computer storage media for the purpose of forensic investigation is one of the essential steps in digital forensics. There are several dozens of commercial and open source digital analysis tools dedicated for this purpose. The challenge is to identify the tool that best fits in a specific case of investigation. To measure the file recovering functionality, we have developed a validation approach for comparing five popular forensic tools: Encase, Recover my files, Recuva, Blade, and FTK. These tools were examined in a fixed scenario to show the differences and capabilities in recovering files after deletion, quick format and full format of a USB stick. Experimental results on selected commercial a...
In recent years we can observe that digital forensics is being applied to a variety of domains as ne...
In this paper we present the current results and analysis of the survey Cloud forensics and critica...
© 2016 IEEE. With the emergence of smartphones and the widespread use of social media services, dist...
© IFIP International Federation for Information Processing 2014. This paper describes a five-phase, ...
© 2014 IEEE. Memory forensics has become an important part of digital forensic investigation. Its im...
Due to the lack of standards in reporting digital evidence items, investigators are facing difficult...
Collecting digital devices in a forensically sound manner is becoming more critical since 80% of all...
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014. The q...
© 2019 IEEE. In this pervasive digital world, we are witnessing an era where cybercriminals are impr...
At the user or surface level, most Database Management System (DBMS) are similar. Most databases con...
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014. This ...
© 2016 IEEE. Manipulation of digital images for the purpose of forgery is a rapidly growing phenomen...
© 2015 IEEE. Database auditing is a prerequisite in the process of database forensics. Log files of ...
© 2016 IEEE. This paper highlights the challenges faced due to non-Availability of trusted specializ...
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2013. Due t...
In recent years we can observe that digital forensics is being applied to a variety of domains as ne...
In this paper we present the current results and analysis of the survey Cloud forensics and critica...
© 2016 IEEE. With the emergence of smartphones and the widespread use of social media services, dist...
© IFIP International Federation for Information Processing 2014. This paper describes a five-phase, ...
© 2014 IEEE. Memory forensics has become an important part of digital forensic investigation. Its im...
Due to the lack of standards in reporting digital evidence items, investigators are facing difficult...
Collecting digital devices in a forensically sound manner is becoming more critical since 80% of all...
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014. The q...
© 2019 IEEE. In this pervasive digital world, we are witnessing an era where cybercriminals are impr...
At the user or surface level, most Database Management System (DBMS) are similar. Most databases con...
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014. This ...
© 2016 IEEE. Manipulation of digital images for the purpose of forgery is a rapidly growing phenomen...
© 2015 IEEE. Database auditing is a prerequisite in the process of database forensics. Log files of ...
© 2016 IEEE. This paper highlights the challenges faced due to non-Availability of trusted specializ...
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2013. Due t...
In recent years we can observe that digital forensics is being applied to a variety of domains as ne...
In this paper we present the current results and analysis of the survey Cloud forensics and critica...
© 2016 IEEE. With the emergence of smartphones and the widespread use of social media services, dist...