2019
DOI: 10.1080/19393555.2019.1689319
|View full text |Cite
|
Sign up to set email alerts
|

Forensic corpus data reduction techniques for faster analysis by eliminating tedious files

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(19 citation statements)
references
References 22 publications
0
19
0
Order By: Relevance
“…KnTTools, which was developed in 2005, is understood to be the first RAM image acquisition from the operating system and analysis application. The search analysis for running processes and threads was carried out in the RAM image by using KnTTools [4]. Image acquisition, using external hardware, was carried out by using the application AfterLife.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…KnTTools, which was developed in 2005, is understood to be the first RAM image acquisition from the operating system and analysis application. The search analysis for running processes and threads was carried out in the RAM image by using KnTTools [4]. Image acquisition, using external hardware, was carried out by using the application AfterLife.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, RAM image acquisition software runs at the kernel mode level. There exist open source and commercial software that acquires RAM images for the Windows operating system [2][3][4]. The RAM images acquired by these software packages are used in RAM analysis and data carving operations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For each file in the NSRL collection, the RDS includes 1) cryptographic hash values of the file's content, 2) information about the software package(s) containing the file, 3) the manufacturer of the package, 4) the original name, and 5) the size of the file. Many studies have used the hash list of RDS to identify and filter known benign files [3], [11], [30], and [31].…”
Section: A Index Searching and Filteringmentioning
confidence: 99%
“…The Regional Computer Forensic Laboratory (RCFL) annual reports reveal a significant increase in the number of digital cases and the volume of data [1]. Consequently, digital forensic laboratories experience the accumulation of evidence awaiting analysis [2], [3].…”
Section: Introductionmentioning
confidence: 99%