2006 IEEE Information Assurance Workshop
DOI: 10.1109/iaw.2006.1652087
|View full text |Cite
|
Sign up to set email alerts
|

Embedding Forensic Capabilities into Networks: Addressing Inefficiencies in Digital Forensics Investigations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
19
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…Note that we consider tsi to be an abstraction over real-time clock variables that may be obtained following techniques such as [16], [7]. The generation of such abstractions is outside the scope of the paper.…”
Section: Operational Preservation Specificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that we consider tsi to be an abstraction over real-time clock variables that may be obtained following techniques such as [16], [7]. The generation of such abstractions is outside the scope of the paper.…”
Section: Operational Preservation Specificationmentioning
confidence: 99%
“…Request permissions from permissions@acm.org. of digital data from digital sources, for proof of incident and ultimately for prosecution of criminal activity [16,36]. Such data often comprises log entries indicating the occurrence of events in the digital sources placed within the environment in which an incident can occur.…”
Section: Introductionmentioning
confidence: 99%
“…Digital forensics is an emerging area within the broader domain of computer security whose main focus is the discovery and preservation of digital evidence for proof of criminal wrongdoing and ultimate prosecution of criminal activity (Endicott-Popovsky and Frincke, 2006). Computer evidence is becoming a routine part of criminal cases with nearly 85% of the current caseloads involving digital evidence (Meadaris, 2006).…”
Section: Introductionmentioning
confidence: 99%
“…The same is true of the lack of technical forensics standardization both in the industry and academia. Despite the growing awareness and academic research on proactive forensics, its specification and implementation is still not consistent in the digital forensics community [4].…”
Section: Introductionmentioning
confidence: 99%