Unifying computer forensics modeling approaches: a software engineering perspective
As an effort to introduce formalism into computer forensics, researchers have presented various modeling techniques for planning, analysis, and documentation of forensics activities. These modeling techniques provide representations of various forensics subjects such as investigative processes, chai...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 39 |
---|---|
container_issue | |
container_start_page | 27 |
container_title | |
container_volume | |
creator | Bogen, A.C. Dampier, D.A. |
description | As an effort to introduce formalism into computer forensics, researchers have presented various modeling techniques for planning, analysis, and documentation of forensics activities. These modeling techniques provide representations of various forensics subjects such as investigative processes, chain of events, and evidence tests. From a software engineering perspective, it seems that several of these computer forensics modeling approaches may be unified to create a more complete, multi-view modeling methodology for examination planning and analysis. This paper proposes a core set of modeling views for a unified computer forensics modeling methodology: investigative process view, case domain view, and, evidence view. An example email threat case scenario is used as the context for a multi-view modeling example. |
doi_str_mv | 10.1109/SADFE.2005.27 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1592519</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1592519</ieee_id><sourcerecordid>1592519</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-260a33dba007e629e605dd7cfb3ee7362a0739c9b9e801aa87eab9b124d0157e3</originalsourceid><addsrcrecordid>eNotjEtLAzEURgMiKHWWrtzkD8x4kzQvd6W2KhRc1K7LncydGuk8SEal_16LfpuzOIePsVsBlRDg77eLx_WqkgC6kvaCFd46sMZrObfOXbEi5w_4nfJGOX3Ntrs-tqfYH3gYuvFzosTbIVGfY8i8Gxo6nh2OYxowvFN-4Mjz0E7fmIhTf4g9UTonI6U8UpjiF92wyxaPmYp_zthuvXpbPpeb16eX5WJTRmH1VEoDqFRTI4AlIz0Z0E1jQ1srIquMRLDKB197ciAQnSWsfS3kvAGhLakZu_v7jUS0H1PsMJ32QnuphVc_MRpP5w</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Unifying computer forensics modeling approaches: a software engineering perspective</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bogen, A.C. ; Dampier, D.A.</creator><creatorcontrib>Bogen, A.C. ; Dampier, D.A.</creatorcontrib><description>As an effort to introduce formalism into computer forensics, researchers have presented various modeling techniques for planning, analysis, and documentation of forensics activities. These modeling techniques provide representations of various forensics subjects such as investigative processes, chain of events, and evidence tests. From a software engineering perspective, it seems that several of these computer forensics modeling approaches may be unified to create a more complete, multi-view modeling methodology for examination planning and analysis. This paper proposes a core set of modeling views for a unified computer forensics modeling methodology: investigative process view, case domain view, and, evidence view. An example email threat case scenario is used as the context for a multi-view modeling example.</description><identifier>ISBN: 9780769524788</identifier><identifier>ISBN: 0769524788</identifier><identifier>DOI: 10.1109/SADFE.2005.27</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Computer science ; Concrete ; Context modeling ; Documentation ; Forensics ; Military computing ; Software engineering ; Testing ; Unified modeling language</subject><ispartof>First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05), 2005, p.27-39</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1592519$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1592519$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bogen, A.C.</creatorcontrib><creatorcontrib>Dampier, D.A.</creatorcontrib><title>Unifying computer forensics modeling approaches: a software engineering perspective</title><title>First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05)</title><addtitle>SADFE</addtitle><description>As an effort to introduce formalism into computer forensics, researchers have presented various modeling techniques for planning, analysis, and documentation of forensics activities. These modeling techniques provide representations of various forensics subjects such as investigative processes, chain of events, and evidence tests. From a software engineering perspective, it seems that several of these computer forensics modeling approaches may be unified to create a more complete, multi-view modeling methodology for examination planning and analysis. This paper proposes a core set of modeling views for a unified computer forensics modeling methodology: investigative process view, case domain view, and, evidence view. An example email threat case scenario is used as the context for a multi-view modeling example.</description><subject>Application software</subject><subject>Computer science</subject><subject>Concrete</subject><subject>Context modeling</subject><subject>Documentation</subject><subject>Forensics</subject><subject>Military computing</subject><subject>Software engineering</subject><subject>Testing</subject><subject>Unified modeling language</subject><isbn>9780769524788</isbn><isbn>0769524788</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjEtLAzEURgMiKHWWrtzkD8x4kzQvd6W2KhRc1K7LncydGuk8SEal_16LfpuzOIePsVsBlRDg77eLx_WqkgC6kvaCFd46sMZrObfOXbEi5w_4nfJGOX3Ntrs-tqfYH3gYuvFzosTbIVGfY8i8Gxo6nh2OYxowvFN-4Mjz0E7fmIhTf4g9UTonI6U8UpjiF92wyxaPmYp_zthuvXpbPpeb16eX5WJTRmH1VEoDqFRTI4AlIz0Z0E1jQ1srIquMRLDKB197ciAQnSWsfS3kvAGhLakZu_v7jUS0H1PsMJ32QnuphVc_MRpP5w</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Bogen, A.C.</creator><creator>Dampier, D.A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2005</creationdate><title>Unifying computer forensics modeling approaches: a software engineering perspective</title><author>Bogen, A.C. ; Dampier, D.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-260a33dba007e629e605dd7cfb3ee7362a0739c9b9e801aa87eab9b124d0157e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Application software</topic><topic>Computer science</topic><topic>Concrete</topic><topic>Context modeling</topic><topic>Documentation</topic><topic>Forensics</topic><topic>Military computing</topic><topic>Software engineering</topic><topic>Testing</topic><topic>Unified modeling language</topic><toplevel>online_resources</toplevel><creatorcontrib>Bogen, A.C.</creatorcontrib><creatorcontrib>Dampier, D.A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bogen, A.C.</au><au>Dampier, D.A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Unifying computer forensics modeling approaches: a software engineering perspective</atitle><btitle>First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05)</btitle><stitle>SADFE</stitle><date>2005</date><risdate>2005</risdate><spage>27</spage><epage>39</epage><pages>27-39</pages><isbn>9780769524788</isbn><isbn>0769524788</isbn><abstract>As an effort to introduce formalism into computer forensics, researchers have presented various modeling techniques for planning, analysis, and documentation of forensics activities. These modeling techniques provide representations of various forensics subjects such as investigative processes, chain of events, and evidence tests. From a software engineering perspective, it seems that several of these computer forensics modeling approaches may be unified to create a more complete, multi-view modeling methodology for examination planning and analysis. This paper proposes a core set of modeling views for a unified computer forensics modeling methodology: investigative process view, case domain view, and, evidence view. An example email threat case scenario is used as the context for a multi-view modeling example.</abstract><pub>IEEE</pub><doi>10.1109/SADFE.2005.27</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769524788 |
ispartof | First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05), 2005, p.27-39 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1592519 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Application software Computer science Concrete Context modeling Documentation Forensics Military computing Software engineering Testing Unified modeling language |
title | Unifying computer forensics modeling approaches: a software engineering perspective |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T17%3A25%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Unifying%20computer%20forensics%20modeling%20approaches:%20a%20software%20engineering%20perspective&rft.btitle=First%20International%20Workshop%20on%20Systematic%20Approaches%20to%20Digital%20Forensic%20Engineering%20(SADFE'05)&rft.au=Bogen,%20A.C.&rft.date=2005&rft.spage=27&rft.epage=39&rft.pages=27-39&rft.isbn=9780769524788&rft.isbn_list=0769524788&rft_id=info:doi/10.1109/SADFE.2005.27&rft_dat=%3Cieee_6IE%3E1592519%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1592519&rfr_iscdi=true |