Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

Research Article

Research and Review on Computer Forensics

Download73 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23602-0_21,
        author={Hong Guo and Bo Jin and Daoli Huang},
        title={Research and Review on Computer Forensics},
        proceedings={Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers},
        proceedings_a={E-FORENSICS},
        year={2012},
        month={10},
        keywords={Computer forensics computer crime digital evidence},
        doi={10.1007/978-3-642-23602-0_21}
    }
    
  • Hong Guo
    Bo Jin
    Daoli Huang
    Year: 2012
    Research and Review on Computer Forensics
    E-FORENSICS
    Springer
    DOI: 10.1007/978-3-642-23602-0_21
Hong Guo1,*, Bo Jin1,*, Daoli Huang1,*
  • 1: Ministry of Public Security, People’s Republic of China (The 3rd Research Institute of Ministry of Public Security)
*Contact email: guohong@stars.org.cn, jinbo@stars.org.cn, huangdaoli@stars.org.cn

Abstract

With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This paper provides foundational concept of computer forensics, outlines various principles of computer forensics, discusses the model of computer forensics and presents a proposed model.