首页> 外文会议>2010 International Conference on Information Science and Applications (ICISA 2010) >A Forensic Model on Deleted-File Verification for Securing Digital Evidence
【24h】

A Forensic Model on Deleted-File Verification for Securing Digital Evidence

机译:用于确保数字证据安全的已删除文件验证的取证模型

获取原文
获取原文并翻译 | 示例

摘要

The computer forensic technique that analyzes the file hidden in the computer or the file information of Windows has been widely used for the criminal check. However, these techniques had the different problems to be presented as the legal resources. The forensic viewpoint has 5 digital evidence principles such as legitimacy, identity, connectivity, speediness, integrity. This thesis is focused on the principle of connectivity. The principle of connectivity so far insisted the evidential connectivity of media, the Chain of Custody, but the research on the connectivity principle of file is not yet made. This thesis analyzed the cause of deleted file, and developed the best model. Also, it used the developed analysis technique to produce the respective model and the case for the precision of model, and applied the model to the case in order to experiment the precision detected. The detection model presented by this thesis will be the important judgmental data for the reliable evidence forensic.
机译:分析计算机中隐藏的文件或Windows的文件信息的计算机取证技术已广泛用于刑事检查。但是,这些技术存在作为法律资源提出的不同问题。法医观点具有5个数字证据原则,例如合法性,身份,连接性,快速性,完整性。本文着眼于连通性原理。到目前为止,连通性原则坚持了媒体的证据连通性,即“产销监管链”,但尚未对文件的连通性原理进行研究。本文分析了文件删除的原因,并提出了最佳模型。此外,它使用发达的分析技术来生成各个模型和用于模型精度的案例,并将该模型应用于案例以测试检测到的精度。本文提出的检测模型将为可靠的证据取证提供重要的判断数据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号