Digital forensic research: current state of the art

S Raghavan - Csi Transactions on ICT, 2013 - Springer
Digital forensics is the process of employing scientific principles and processes to analyze
electronically stored information and determine the sequence of events which led to a …

A survey of main memory acquisition and analysis techniques for the windows operating system

S Vömel, FC Freiling - Digital Investigation, 2011 - Elsevier
Traditional, persistent data-oriented approaches in computer forensics face some limitations
regarding a number of technological developments, eg, rapidly increasing storage …

Technical issues of forensic investigations in cloud computing environments

D Birk, C Wegener - 2011 Sixth IEEE international workshop on …, 2011 - ieeexplore.ieee.org
Cloud Computing is arguably one of the most discussed information technologies today. It
presents many promising technological and economical opportunities. However, many …

[HTML][HTML] Let the robots do it!–Taking a look at Robotic Process Automation and its potential application in digital forensics

A Asquith, G Horsman - Forensic Science International: Reports, 2019 - Elsevier
The challenges of tackling increasing caseloads, large volumes of digital data and
maintaining examination efficiency in order to adhere to tight criminal justice system …

Acquisition and analysis of volatile memory from android devices

J Sylve, A Case, L Marziale, GG Richard - Digital Investigation, 2012 - Elsevier
The Android operating system for mobile phones, which is still relatively new, is rapidly
gaining market share, with dozens of smartphones and tablets either released or set to be …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

[PDF][PDF] SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.

Z Lin, J Rhee, X Zhang, D Xu, X Jiang - Ndss, 2011 - researchgate.net
Brute force scanning of kernel memory images for finding kernel data structure instances is
an important function in many computer security and forensics applications. Brute force …

The forensics edge management system: A concept and design

E Oriwoh, P Sant - 2013 IEEE 10th International Conference on …, 2013 - ieeexplore.ieee.org
This paper describes the design of the Forensics Edge Management System (FEMS), a
system that autonomously provides security and forensic services within the home Internet of …

Coupled tendon-driven multijoint manipulator

S Hirose, S Ma - Proceedings. 1991 IEEE International Conference on …, 1991 - computer.org
A coupled tendon-driven manipulator called the CT arm is introduced, an its control is
discussed. The CT arm has a specific tendon traction force transmission mechanism in …

An ontology-based approach for the reconstruction and analysis of digital incidents timelines

Y Chabot, A Bertaux, C Nicolle, T Kechadi - Digital Investigation, 2015 - Elsevier
Due to the democratisation of new technologies, computer forensics investigators have to
deal with volumes of data which are becoming increasingly large and heterogeneous …