Month: February 2013

  • Signature Based Detection of User Events for Post-Mortem Forensic Analysis

    Signature Based Detection of User Events for Post-Mortem Forensic Analysis

    The concept of signatures is used in many fields, normally for the detection of some sort of pattern. For example, antivirus and network intrusion detection systems sometimes implement signature matching to attempt to differentiate legitimate code or network traffic from malicious data. The principle of these systems that that within a given set of data, malicious data…

  • Lectures in Mathematics for Digital Forensic Researchers

    Lectures in Mathematics for Digital Forensic Researchers

    Digital forensics is a very practical discipline that addresses the needs of every day investigations. Whether deleted data needs to be recovered or the suspect’s  photographs need to be attributed to the suspect’s photo camera – forensic analyst has to do whatever it takes to advance the investigation. There is rarely any time to think…

  • The Digital Investigation Process

    Everyday new ideas all around the world are born. By the start of the new millennium the race was on, as everyone and their brother realized how potent technology was to their future. And now as we move into the second decade of the millennium, technological advancements became one of the pillars of a nation.…