Access the full text.
Sign up today, get DeepDyve free for 14 days.
L Lamport (1978)
Time, clocks, and the ordering of events in a distributed systemCommun ACM, 21
H Berghel (2007)
Hiding data, forensics and anti-forensicsCommun ACM, 50
BD Carrier (2005)
Volume analysis of disk spanning multiple volumesDigit Investig, 2
RT Mercuri (2005)
Challenges in forensic computingCommun ACM, 48
A Brinson, A Robinson, M Rogers (2006)
A cyber-forensics ontology: creating a new approach to studying cyber forensicsDigit Investig, 3
B Turnbull, G Blundell, G Slay (2006)
Google desktop as a source of digital evidenceInt J Digit Evidence (IJDE), 5
T Pering, R Ballagas, R Want (2005)
Spontaneous marriages of mobile devices and interactive spacesCommun ACM, 48
E Vlastos, A Patel (2008)
An open source forensic tool to visualize digital evidenceComput Stand Interfaces, 30
C Hosmer (2006)
Digital evidence bagCommun ACM, 49
R Leighland, AW Krings (2004)
A formalization of digital forensicsInt J Digit Evidence, 3
S Mead (2006)
Unique file identification in the national software reference libraryDigit Investig, 3
P Sanderson (2006)
Identifying an existing file via KaZaA artefactsDigit Investig, 3
BD Carrier, J Grand (2004)
A hardware-based memory acquisition procedure for digital investigationsDigit Investig, 1
E Casey (2007)
Digital evidence maps—a sign of timesDigit Investig (Editorial), 4
SL Garfinkel, J Migletz (2009)
New XML-based files: implications for forensicsIEEE Secur Privacy Mag, 7
Y Rui, TS Huang, Chang Shih-Fu (1998)
Image retrieval: current technologies, promising directions and open issuesJ Vis Commun Image Represent (IJVCIR), 10
B Nutter (2008)
Pinpointing TomTom location records: a forensic analysisDigit Investig, 5
E Casey (2007)
What does “forensically sound” mean?Digit Investig (Editorial), 4
BJ Nikkel (2006)
Improving evidence acquisition from live network sourcesDigit Investig, 3
NL Beebe, JG Clark (2005)
A hierarchical, objectives-based framework for the digital investigations processDigit Investig, 2
NL Beebe, JG Clark (2007)
Digital forensic text string searching: improving information retrieval effectiveness by thematically clustering search resultsDigit Investig, 4
S Lalis, A Karypidis, A Savidis (2005)
Ad-hoc composition in wearable and mobile computingCommun ACM, 48
SL Garfinkel (2006)
AFF: a new format for storing hard drive imagesCommun ACM, 49
G Wang, H Chen, H Atabakhsh (2004)
Automatically detecting deceptive criminal identitiesCommun ACM, 47
MS Olievier (2008)
On metadata context in database forensicsDigit Investig, 5
SO Ciardhuain (2004)
An extended model for cybercrime investigationsInt J Digit Evidence, 3
A Laurie (2006)
Digital detectiveDigit Investig, 3
Z Fu, X Sun, Y Liu, Bo Li (2011)
Forensic investigation of OOXML format documentsDigit Investig, 8
SL Garfinkel (2006)
Forensic feature extraction and cross drive analysisDigit Investig, 3
BD Carrier, EH Spafford (2003)
Getting physical with the digital investigation processInt J Digit Evidence, 2
J Allen (1991)
Time and time again: the many ways to represent timeInt J Intell Syst, 6
W Jansen, R Ayers (2005)
An overview and analysis of PDA forensic toolsDigit Investig, 2
J Allen (1983)
Maintaining knowledge about temporal intervalsCommun ACM, 26
G Marchionini (2006)
Exploratory search: from finding to understandingCommun ACM, 49
A Castiglione, A Santis, C Soriente (2007)
Taking advantages of a disadvantage: digital forensics and steganography using document metadataJ Syst Softw, 80
M Myers, M Rogers (2004)
Computer forensics: a need for standardization and certificationInt J Digit Evidence, 3
B Schatz (2007)
BodySnatcher: towards reliable volatile memory acquisition by softwareDigit Investig, 4
MC Schraffel, M Wilson, M Russel, DA Smith (2006)
MSpace: improving information access to multimedia domains with multimodal exploratory searchCommun ACM, 49
C Boyd, P Forster (2004)
Time and date issues in forensic computing—a case studyDigit Investig, 1
J Petroni, L Nick, A Walters, T Fraser, WA Arbaugh (2006)
FATKit: a framework for the extraction and analysis of digital forensic data from volatile system memoryDigit Investig, 3
HT Sencar, N Memon (2009)
Identification and recovery of JPEG files with missing fragmentsDigit Investig, 6
C Lavelle, A Konrad (2007)
FriendlyRoboCopy: a GUI to robocopy for computer forensic investigatorsDigit Investig, 4
F Buchholz (2007)
An improved clock model for translating timestamps, JMU-INFOSEC-TR-2007-001
F Buchholz, EH Spafford (2007)
Run-time label propagation for forensic audit dataComput Secur, 26
HT Sencar, N Memon (2008)
Overview of state-of-the-art in digital image forensics, part of Indian statistical institute platinum jubilee monograph series titled statistical science and interdisciplinary research
P Turner (2005)
Digital provenance—interpretation, verification and corroborationDigit Investig, 2
J Xu, H Chen (2005)
Criminal network analysis and visualizationCommun ACM, 48
P Turner (2007)
Applying a forensic approach to incident response, network investigation and system administration using digital evidence bagsDigit Investig, 4
A Johnston, J Reust (2006)
Network intrusion investigation—preparation and challengesDigit Investig, 3
MA Hearst (2006)
Clustering versus faceted categories for information explorationCommun ACM, 49
SL Garfinkel, A Parker-Wood, D Huynh, J Migletz (2010)
An automated solution to the multiuser carved data ascription problemIEEE Trans Inf Forensics Secur, 5
M Gerber, J Leeson (2004)
Formalization of computer input and output: the Hadley modelDigit Investig, 1
V Mee, T Tryfonas, I Sutherland (2006)
The windows registry as a forensic artefact: illustrating evidence collection for Internet usageDigit Investig, 3
G Shankaranarayanan, A Even (2006)
The metadata enigmaCommun ACM, 49
S Mocas (2004)
Building theoretical underpinnings for digital forensics researchDigit Investig, 1
F Casadei, A Savoldi, P Gubian (2006)
Forensics and SIM cards: an overviewInt J Digit Evidence, 5
P Turner (2005)
Unification of digital evidence from disparate sources (digital evidence bags)Digit Investig, 2
EE Kenneally, CLT Brown (2005)
Risk sensitive digital evidence collectionDigit Investig, 2
MS Barik, G Gupta, S Sinha, A Mishra, C Mazumdar (2007)
Efficient techniques for enhancing forensic capabilities of Ext2 file systemDigit Investig, 4
MR Gupta, MD Hoeschele, MK Rogers (2006)
Hidden disk areas: hPA and DCOInt J Digit Evidence, 5
(2006)
Standardizing digital evidence storageCommun ACM, 49
MNA Khan, CR Chatwin, RCD Young (2007)
A framework for post-event timeline reconstruction using neural networksDigit Investig, 4
A Schuster (2007)
Introducing the microsoft vista event log file formatDigit Investig, 4
N Agrawal, WJ Bolosky, JR Douceur, JR Lorsch (2007)
A five-year study of file system metadataACM Trans Storage, 3
J Solomon, E Huebner, D Bem, Szezynska (2007)
User data persistence in physical memoryDigit Investig, 4
S-J Wang, D-Y Kao (2007)
Internet forensics on the basis of evidence gathering with peep attacksComput Stand Interfaces, 29
HM Gladney (2006)
Principles for digital preservationCommun ACM, 49
F Adelstein (2006)
Live forensics: diagnosing your system without killing it firstCommun ACM, 49
GM Miskelly, JH Wagner (2005)
Using spectral information in forensic imagingForensic Sci Int, 155
M Reith, C Carr, G Gunsch (2002)
An examination of digital forensic modelsInt J Digit Evidence, 1
F Buchholz, EH Spafford (2004)
On the role of system metadata in digital forensicsDigit Investig, 1
MM Shannon (2004)
Forensic relative strength scoring: aSCII and entropy scoringInt J Digit Evidence, 2
Kan-San Choi, EY Lam, KKY Wong (2006)
Source camera identification using footprints from len aberrationProceedings of the SPIE-IS&T Electronic Imaging SPIE, 6069
J-H Hoepmann, B Jacobs (2007)
Increased security through open sourceCommun ACM, 50
MW Stevens (2004)
Unification of relative time frames for digital forensicsDigit Investig, 1
GG Richard, V Roussev, L Marziale (2007)
Forensic discovery auditing of digital evidence containersDigit Investig, 4
SL Garfinkel (2007)
Carving contiguous and fragmented files with fast object validationDigit Investig, 4
C Hargreaves, H Chivers, D Titheridge (2008)
Windows vista and digital investigationsDigit Investig, 5
BD Carrier (2003)
Defining digital forensic examination and analysis tools using abstraction layersInt J Digit Evidence (IJDE), 1
E Casey (2006)
Investigating sophisticated security breachesCommun ACM, 49
CE Dyreson, RT Snodgrass (1993)
Timestamps semantics and representationJ Inf Syst, 18
SL Garfinkel (2009)
Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format library and toolsInt J Digit Crime Forensics, 1
B Park, J Park, S Lee (2009)
Data concealment and detection in microsoft office 2007 filesDigit Investig, 5
M Boutell, J Luo (2005)
Beyond pixels: exploiting camera metadata for photo classificationPattern Recognit Image Underst Photogr, 38
V Roussev, GG Richard, L Marziale (2007)
Multi-resolution similarity hashingDigit Investig, 4
JD Kornblum (2004)
The linux and the forensic acquisition of hard disks with odd number of sectorsInt J Digit Evidence, 3
P Gladyshev, A Patel (2004)
Finite state machine approach to digital event reconstructionDigit Investig, 1
GG Richard, V Roussev (2006)
Next-generation digital forensicsCommun ACM, 49
AK Jain, A Ross (2004)
Multibiometric systemsCommun ACM, 47
E Kee, MK Johnson, H Farid (2011)
Digital image authentication from JPEG headersIEEE Trans Inf Forensic Secur, 6
S Teerlink, R Erbacher (2006)
Improving the computer forensic process through visualizationCommun ACM, 49
S-J Wang (2007)
Measures of retaining digital evidence to prosecute computer-based cyber-crimesComput Stand Interfaces, 29
T Slewe, M Hooenboom (2004)
Who will rob you on the digital highway?Commun ACM, 47
MC Weil (2002)
Dynamic time and date stamp analysisInt J Digit Evidence, 1
P Alvarez (2004)
Using extended file information (EXIF) file headers in digital evidence analysisInt J Alvarezal Evidence, 2
J Coutaz, JL Crowley, S Dobson, D Garlan (2005)
Context is keyCommun ACM, 48
(2003)
Good practice guide for computer based electronic evidence
K Bohm, TC Rakow (1994)
Metadata for multimedia documentsSIGMOD Rec., 23
Digital forensics is the process of employing scientific principles and processes to analyze electronically stored information and determine the sequence of events which led to a particular incident. In this digital age, it is important for researchers to become aware of the recent developments in this dynamic field and understand scope for the future. The past decade has witnessed significant technological advancements to aid during a digital investigation. Many methodologies, tools and techniques have found their way into the field designed on forensic principles. Digital forensics has also witnessed many innovative approaches that have been explored to acquire and analyze digital evidence from diverse sources. In this paper, we review the research literature since 2000 and categorize developments in the field into four major categories. In recent years the exponential growth of technological has also brought with it some serious challenges for digital forensic research which is elucidated. Within each category, research is sub-classified into conceptual and practical advancements. We highlight the observations made by previous researchers and summarize the research directions for the future.
CSI Transactions on ICT – Springer Journals
Published: Nov 13, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.