期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Forensics: Collection of Sound Digital Evidence
1
作者 Richard Kabanda Harihar Thapa Luis Rivera 《Journal of Information Security》 2023年第4期454-463,共10页
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd... This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court. 展开更多
关键词 Electronic Discovery Reference Model National Institute of Standards and Technology (NIST) Message-Digest Algorithm Secure Hash Algorithm forensically Sound Digital evidence
下载PDF
A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory 被引量:2
2
作者 TIAN Zhihong JIANG Wei +1 位作者 LI Yang DONG Lan 《China Communications》 SCIE CSCD 2014年第5期91-97,共7页
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se... Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators. 展开更多
关键词 network forensics security dempster-shafer theory digital evidence fusion
下载PDF
A Transductive Scheme Based Inference Techniques for Network Forensic Analysis 被引量:1
3
作者 TIAN Zhihong JIANG Wei LI Yang 《China Communications》 SCIE CSCD 2015年第2期167-176,共10页
Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;th... Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;the comprehensibility of evidence extracting from collected data;the efficiency of evidence analysis methods,etc.To solve these problems,in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments,and extract digital evidence automatically.At the end of the paper,we evaluate our method on a series of experiments on KDD Cup 1999 dataset.The results demonstrate that our methods are actually effective for real-time network forensics,and can provide comprehensible aid for a forensic expert. 展开更多
关键词 network forensics transductive scheme security digital evidence
下载PDF
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography 被引量:1
4
作者 Richard E Overill Jantje A M Silomon +1 位作者 Kam-Pui Chow Hayson Tse 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期9-15,共7页
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy... The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time. 展开更多
关键词 Trojan Horse defence child pornography digital forensic evidence complexity quantitative plausibility metrics posterior odds
下载PDF
Delayed reception of live blowfly (Calliphora vicina and Chrysomya rufifacies)larval samples: implications for minimum postmortem interval estimates
5
作者 Melanie S.Archer Stephanie D.Jones James F.Wallman 《Forensic Sciences Research》 2018年第1期27-39,共13页
Forensic entomology evidence collected by police and mortuary staff may be delayed in getting to the entomologist.Live samples may continue developing and alter minimum postmortem interval (PMImin) estimates.This stud... Forensic entomology evidence collected by police and mortuary staff may be delayed in getting to the entomologist.Live samples may continue developing and alter minimum postmortem interval (PMImin) estimates.This study investigated development of simulated evidential samples of Calliphora vicina Robineau-Desvoidy and Chrysomya rufifacies (Macquart) (Diptera: Calliphoridae) maggots.Maggots of each species were studied in three developmental classes: "small" (late second/early third instar),"mid" (mid third instar) and "large" (late third instar).Seven replicates of 11 maggots in each class were assigned without food to four treatments: (1) 24 h at 20 ℃;(2) 24 h at 4 ℃;(3) 48 h at 20 ℃ and (4) 48 h at 4 ℃.There was a significant difference in absolute length change across treatments,reflecting size for C vicina,and interaction between size,time and temperature for Ch.rufifacies.Calliphora vicina maggots showed minimal mortality,and most second instar larvae moulted by the experiment's end.Chrysomya rufifacies showed heavy mortality and minimal moulting from the second to third instar.Only "large" Ch.rutifacies maggots kept at room temperature for 48 h pupariated.Since these results confirm that development can continue in live unfed maggot samples after their collection,it is not advisable to delay their preservation. 展开更多
关键词 forensic science forensic entomology forensic evidence larval development best practice sampling
原文传递
The Rational Thinking of Expert Opinion and Communicating in Courtroom
6
作者 Bing Li Yuanfeng Wang 《Journal of Forensic Science and Medicine》 2017年第2期82-84,共3页
Since the past half century,expert testimony has played an increasingly important role in Chinese litigation.As the amount of expert testimony has grown,the issues about its admissibility and scientific foundation rel... Since the past half century,expert testimony has played an increasingly important role in Chinese litigation.As the amount of expert testimony has grown,the issues about its admissibility and scientific foundation related to evidence are becoming to be questioned commonly.Since eighteenth central committee(China)adopted the decision of the Central Committee of China on several important issues in promoting the legal system,the evidence was redefined to become the predominance in the whole proceeding.This article reviews the expert knowledge implicit in the opinions.It argues that the expert opinions ask judges to be aware of the role of communicationg between participants.Expert opinion is not only gained from laboratory,but also socially constructed in the rational expression and communication,which requir us think logically in terms of legal perceptions of science and expert knowledge in the empirical world. 展开更多
关键词 Bayesian approach conclusion scale expert opinion forensic evidence
原文传递
Study of Autosomal Short Tandem Repeat Loci Using ITO Method in Full‑Sibling Identification
7
作者 Li Yuan Xu Xu +6 位作者 He Ren Zhao Zhao Tong Wang Shicheng Hao Jinpei Zhang Yan Liu Yan Xu 《Journal of Forensic Science and Medicine》 2020年第1期5-11,I0002-I0005,共11页
This study aimed to investigate the application of autosomal short tandem repeat(STR)loci using the ITO method and discriminant function algorithm for full‑sibling(FS)identification.A total of 342 pairs of full siblin... This study aimed to investigate the application of autosomal short tandem repeat(STR)loci using the ITO method and discriminant function algorithm for full‑sibling(FS)identification.A total of 342 pairs of full siblings(FSs)and 3900 pairs of unrelated individuals(UIs)were genotyped at 51 STR loci.The groups were in accordance with discrimination power(DP)values and the number of loci,and the values of FS index(FSI)of FSs and UIs were calculated by the ITO method.The discriminant functions of FS–UI were established using the Fisher’s discriminant analysis method with SPSS 19.0 software.All the lgFSI values in the FS and UI groups followed a normal distribution,and there were significant differences between the two pairs.A higher average DP value was associated with a more significant difference,as was a greater number of STR loci detected.Receiver operator characteristic curves showed that the accuracy of FS identification can be affected by both locus polymorphism and the number of loci detected.Comparing the rate of false positives and false negatives of discriminant function between the two groups,a higher average DP value and larger number of loci detected were associated with a lower rate of miscarriage of justice and were more helpful for FS–UI identification.The ITO‑based discriminant analysis method has high applicability in FS–UI tests.Testing of a greater number of STR loci promotes FS identification. 展开更多
关键词 Discriminant analysis forensic biological evidence full-sib relation ITO method short tandem repeat
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部