2009 Fifth International Joint Conference on INC, IMS and IDC 2009
DOI: 10.1109/ncm.2009.246
|View full text |Cite
|
Sign up to set email alerts
|

A Stepwise Methodology for Tracing Computer Usage

Abstract: In digital forensics investigation, a general method of investigating the suspect's computer was to duplicate storage media or image and then obtain the case-related data from these. However, the increase in the capacity of storage media made this method take much longer time. Also, this implies that more data can exist in the suspect's computer so that finding relevant data will take a lot of time and efforts. Moreover, in case where imaging of the entire disk is not possible due to legal matters, selective a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Data analysis is performed only with those data that are needed in each step. Figure 3 describes the overall procedure of the PIM [2].…”
Section: Pim (Phased Investigation Methodology For Tracing Computementioning
confidence: 99%
See 1 more Smart Citation
“…Data analysis is performed only with those data that are needed in each step. Figure 3 describes the overall procedure of the PIM [2].…”
Section: Pim (Phased Investigation Methodology For Tracing Computementioning
confidence: 99%
“…Having that said, methods for selective confiscation of case-related data and evidence investigation are necessary [2].…”
Section: Introductionmentioning
confidence: 99%