Communications of the ACM
IEEE Internet Computing
Towards Proactive Computer-System Forensics
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Next-generation digital forensics
Communications of the ACM - Next-generation cyber forensics
An Ad Hoc Review of Digital Forensic Models
SADFE '07 Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering
The BSD packet filter: a new architecture for user-level packet capture
USENIX'93 Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings
International Cooperation to Fight Transnational Cybercrime
WDFIA '07 Proceedings of the Second International Workshop on Digital Forensics and Incident Analysis
The impact of full disk encryption on digital forensics
ACM SIGOPS Operating Systems Review
Virtualization and Digital Forensics: A Research and Education Agenda
Journal of Digital Forensic Practice
Digital Forensics: Defining a Research Agenda
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Spamalytics: an empirical analysis of spam marketing conversion
Communications of the ACM - The Status of the P versus NP Problem
Principles of Computer System Design: An Introduction
Principles of Computer System Design: An Introduction
Automating Disk Forensic Processing with SleuthKit, XML and Python
SADFE '09 Proceedings of the 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering
Building theoretical underpinnings for digital forensics research
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Bringing domain-specific languages to digital forensics
Proceedings of the 33rd International Conference on Software Engineering
Distributed forensics and incident response in the enterprise
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Domain-Specific optimization in digital forensics
ICMT'12 Proceedings of the 5th international conference on Theory and Practice of Model Transformations
A Model for Hybrid Evidence Investigation
International Journal of Digital Crime and Forensics
Horizon extender: long-term preservation of data leakage evidence in web traffic
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach
International Journal of Mobile Computing and Multimedia Communications
Hi-index | 0.00 |
Today's Golden Age of computer forensics is quickly coming to an end. Without a clear strategy for enabling research efforts that build upon one another, forensic research will fall behind the market, tools will become increasingly obsolete, and law enforcement, military and other users of computer forensics products will be unable to rely on the results of forensic analysis. This article summarizes current forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for data representation and forensic processing.