Computer forensics: incident response essentials
Computer forensics: incident response essentials
Queue - VoIP
The real national-security needs for VoIP
Communications of the ACM
Digital Forensics: Validation and Verification in a Dynamic Work Environment
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Information leakage in ubiquitous Voice-over-IP communications
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
The impact of forensic computing on telecommunications
IEEE Communications Magazine
PinDr0p: using single-ended audio features to determine call provenance
Proceedings of the 17th ACM conference on Computer and communications security
A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
With the tremendous growth in popularity and bandwidth of the Internet, VoIP technology has emerged that allows phone calls to be routed over Internet infrastructure rather than the traditional Public Switched Telephone Network (PSTN) infrastructure. The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. This paper presents and discusses experimental work carried out to explore methods by which electronic evidence may be collected from systems where VoIP conversations play an important role in suspected criminal activity or communications