Skip to content

Forensic Research Papers


ICV 2016: 110.89

Forensic science is a multidisciplinary subject that drawn principally from Chemistry, Physics, Biology, Geology, Psychology and even social sciences. It is used to for the scientific assessment of DNA, blood samples, bones and so on. Forensic plays an important role in criminal investigations and it is equally used in archeology, Anthropology, Astronomy, Biology, Geology and Victimology .

Journal of Forensic Research is a peer reviewed journal, serving the International Scientific Community. This forensic science journal with highest impact factor offers an Open Access platform to the authors to publish their research outcome.

Journal of Forensic Research (JFR) is a scholarly Open Access journal that aims to publish most complete and reliable source of information on vast topics of Forensic discoveries that include various aspects of Forensic Genetics & DNA Analysis, Finger-printing & Techniques, Environmental Forensics, Forensic Clinical Medicine, Criminal Cases and current developments in the mode of original research and review articles, as well as case reports, short communications, commentaries, mini reviews and making them freely available online without any restrictions or any other subscriptions to researchers worldwide.

This scientific journal includes a wide range of fields in its discipline to create a platform for the authors to make their contribution towards the journal and the editorial office promises a peer review process for the submitted manuscripts for the quality of scholarly publishing.

The journal is using Editorial Manager System to maintain quality in online manuscript submission, review and tracking. Editorial board members of the Journal of Forensic Research or outside experts conduct the review; at least two independent reviewer’s approval followed by the editor is required for the acceptance of any citable manuscript.

Peer reviewed journals follow a rigorous review process by strictly adhering to the standard research format and style, enhances the quality of research work.

OMICS Group is publishing 700+ open access journals with the support of about 50000 editorial board members. And conducts 1000+ International conferences across USA, Europe, Asia pacific, Middle East and Australia. OMICS got scientific alliances with more than 1000 Scientific associations and agencies all over the world.

Submit manuscript at http://editorialmanager.com/medicaljournals/ a or send as an e-mail attachment to the Editorial Office at [email protected]

Forensic Science

Forensic science is a scientific advancement in the field of crime investigation and the information gathered and examined will be finally submitted as evidence in the court of law. Forensic science involves several scientific fields in process of retaining evidence, such as medicine, microbiology , pathology, chemistry etc.

Forensic science is an important subject for crime investigation. Forensic science could be described as a combination of science and criminal justice. Forensic science paves the way for justice, with the help of technology advances. Every cutting-edge technology used by forensic researcher will be an effort by forensic science to prove a crime.

Related journals of Forensic Science

Journal of Forensic Research, Journal of Forensic Psychology, Forensic Nursing: Open Access, Forensic Biomechanics,  Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Anthropology, Forensic Pathology Open Access, Forensic Science International: Genetics, Forensic Science International: Genetics Supplement Series, Journal of Forensic Sciences

Forensic Analytical Techniques

Forensic analytical techniques play a major role in solving many criminal cases. DNA analysis, Finger printing, voice recognition, hand writing analysis, ballistics, autopsy etc are forensic methods to detect a reason for crime or death.

Most important areas of physical, life and materials science are used in forensic analytical techniques. Techniques such as chromatography will be used as forensic analytical technique, where some hidden metals and chemicals are traced. There are forensic analytical techniques, where the age of an unknown human body will be estimated. In some forensic analytical techniques, data will be analysed using digital forensics.

Related journals of Forensic analytical techniques

Journal of Forensic Research, Forensic Science International: Genetics, Forensic Science International: Genetics Supplement Series, Journal of Forensic Sciences

Forensic Microbiology

Forensic microbiology is an evolving field in forensic research. To face new concepts of threat to human kind in the form of bioterror and bio crime, this field has emerged. Microbial genetic analysis and subtyping of infectious is major field of research in forensic microbiology.

Sample storage and sample collection in the crime scene is a major aspect in forensic microbiology. Further these samples will be processed and recorded in secured forensic microbiology laboratory. The maintenance of sterile conditions in forensic microbiology laboratory for evidence analysis is important. Variola major virus (smallpox), Bacillus anthracis (anthrax), Yersinia pestis (plague), Clostridium botulinum toxin (botulism), Francisella tularensis (tularemia), and viral hemorrhagic fever viruses are some of the agents considered as most dangerous in forensic microbiology.

Related journals of Forensic Microbiology

Journal of Forensic Research, Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Anthropology, Forensic Pathology Open Access, Indian Journal of Forensic Medicine and Toxicology, Journal of Punjab Academy of Forensic Medicine and Toxicology,Anil Aggrawal's Internet Journal of Forensic Medicine and Toxicology, Forensic Science International: Genetics Supplement Series, Journal of Forensic Sciences

Forensic Chemistry

Chemical analysis has an important role in law enforcement and forensics. This methodology is known as Forensic chemistry. The purity of a material could be detected using spectroscopy techniques and this could be major analysis in approving results. To detect evidences and in the field of narcotics, forensic chemistry play an important role.

Illegal drugs are major target of forensic chemistry experts. These drugs are threat to society and global market, where in forensic science; the forensic chemistry is widely used to explore these crimes. There are forensic analytical techniques, where forensic chemistry is used to estimate age of an unknown human body will be estimated. Use of chemicals in revealing unknown facts of evidence is forensic chemistry.

Related journals of Forensic Chemistry

Journal of Forensic Research, Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Anthropology, Forensic Pathology Open Access, Indian Journal of Forensic Medicine and Toxicology, Journal of Punjab Academy of Forensic Medicine and Toxicology,Anil Aggrawal's Internet Journal of Forensic Medicine and Toxicology, Forensic Science International: Genetics Supplement Series, Journal of Forensic Sciences, Forensic Toxicology

DNA Profiling

A forensic technique used to find individuals by characteristics of their DNA is known as DNA profiling. A DNA profile is a small set of DNA variations. It is very different in all unrelated individuals making it unique as fingerprints. DNA profiling is not genome sequencing.

Discrimination of one being to another with the help of hypervariable minisatellite deoxyribonucleic acid (DNA) is forensic DNA profiling. Using PCR, several DNA profiles have been created and stored in developed countries. These DNA profiles will be further used to compare evidences and prove crimes. Genetic engineering has a very good role in DNA profiling.

Related journals of DNA profiling

Journal of Forensic Research, Forensic medicine, Forensic Anthropology, Forensic Pathology Open Access, Forensic Science International: Genetics, Forensic Science International: Genetics Supplement Series, Journal of Forensic Sciences

Forensic Pathology

To know the cause of death is important in criminal investigation. Cause of death and time of death could be known after studying corpse, which is known as autopsy. The circumstances surrounding the cause of death, such as Homicide, Accidental, Natural, Suicide and Undetermined could be identified by the forensic pathology.

Post-mortem examination is nothing but, autopsy and this has an important role in proving many crimes and the science is forensic pathology. In forensic pathology, the type of autopsy used is known as medico-legal and forensic autopsy. Forensic pathology deals with criminal deaths and unnatural deaths. Forensic pathology reports will be submitted to court for justice.

Related journals of Forensic Pathology

Journal of Forensic Research, Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Pathology Open Access, Indian Journal of Forensic Medicine and Toxicology, Journal of Punjab Academy of Forensic Medicine and Toxicology,Anil Aggrawal's Internet Journal of Forensic Medicine and Toxicology, Forensic Science International: Genetics Supplement Series, Journal of Forensic Sciences

Forensic Age Estimation

In a criminal scene, when an unknown body of a victim has been obtained, the forensic experts start to analyse the evidences. Like cause of death, details of victim, such as age. Thus forensic age estimation has an important role. There are some patterns like size of the body, teeth, skull analysis are used to determine age of a person.

Cold cases are known for their complications and without proper expertise and methodology, these cases cannot be proved and forensic age estimation has an important role in these cases. Forensic age estimation deals with the crimes, where the dead body, has been buried or decomposed, burnt (fire accidents) etc. The forensic experts identify the victim, using scientific forensic age estimation techniques. Identifying a person’s, with forensic age estimation to identify his age is also an important aspect.

Related journals of Forensic age estimation

Journal of Forensic Research, Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Anthropology, Forensic Pathology Open Access, Forensic Science International: Genetics, Forensic Science International: Genetics Supplement Series, Journal of Forensic Sciences

Forensic DNA Analysis

Both in civil and criminal cases DNA analysis has become as an important tool to solve cases. In crime scene, evidences like hair, skin, body remains in burnt cases, semen in rape cases etc. will be analysed for DNA matches. In cases such as paternity confirmation also, DNA analysis is being used. This filed of science is Forensic DNA analysis.

Discrimination of one being to another with the help of hypervariable minisatellite deoxyribonucleic acid (DNA) is forensic DNA analysis. Using PCR, several DNA profiles have been created and stored in developed countries for further forensic DNA analysis. These forensic DNA analysis will be further used to compare evidences and prove crimes. Genetic engineering has a very good role in forensic DNA analysis.

Related journals of Forensic DNA Analysis

Journal of Forensic Research, Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Anthropology, Forensic Pathology Open Access, Indian Journal of Forensic Medicine and Toxicology, Journal of Punjab Academy of Forensic Medicine and Toxicology,Anil Aggrawal's Internet Journal of Forensic Medicine and Toxicology, Forensic Science International: Genetics Supplement Series, Journal of Forensic Sciences

Forensic Engineering

Forensic engineering is the study of materials, products, structures or components that fail or do not operate or function as intended. Ultimately, resulting in personal injury or damage to a property and these cases will be dealt by law enforcement. When proper measures are not taken by industries or companies in process of corruption, results in damage of individuals and treated to be crime.

Forensic engineering is an important subject for crime investigation. Forensic engineering could be described as a combination of science and criminal justice. Forensic engineering paves the way for justice, with the help of technology advances. Every cutting-edge technology used by forensic researcher will be an effort by forensic engineering to prove a crime.

Related Journals of Forensic Engineering

Journal of Forensic Research, Forensic Biomechanics, Journal of Forensic Science

Forensic Linguistics

There are several languages in world and studying these languages scientifically is known as linguistics. Application of these studies in context of law, language, crime investigation, trial, and judicial procedure is known as Forensic linguistics. The study of the language of legal texts includes a wide range of forensic texts.

Forensic linguistics is an important subject for crime investigation. Forensic linguistics could be described as a combination of language understanding and criminal nature. Forensic linguistics paves the way for justice, with the help of technology advances and recording of voices are used as evidences. Every new technology adopted and used by forensic researchers in this case will be an effort by forensic linguistics to prove a crime.

Related Journals of Forensic Linguistics

Journal of Forensic Research, Journal of Forensic Psychology, Forensic Nursing: Open Access, Forensic Anthropology, Journal of Forensic Science

Forensic Photography

Forensic Photography is nothing but crime scene photography. Reproduction and reconstruction of a crime scene has an important aspect to solve a crime. These images are analysed to reconstruct crime scene. Crime or accident scene photographers commonly capture images in color but also in black and white.

Forensic photography is an important subject for crime investigation. Forensic photography could be described as a combination of visual understanding and criminal nature. Forensic photography paves the way for justice, with the help of technology advances and recording of visuals are used as evidences. Every new technology like closed-circuit cameras are being adopted and used by forensic researchers in this case will be an effort by Forensic photography to prove a crime.

Related Journals of Forensic Photography

Journal of Forensic Research, Journal of Forensic Science

Crime Reconstruction

When a place will be identified as an area, where the criminal activity has been commissioned, this area will be examined by forensic experts . Thus, the crime scene will be imagined and with the evidences obtained and analysed by deductive and inductive reasoning, physical evidence and scientific methods. Finally, the criminal activity will rebuilt and is known as crime reconstruction.

Crime reconstruction is an important subject for crime investigation. Crime reconstruction could be described as a combination of visual understanding, voice recordings and criminal records. Crime reconstruction paves the way for justice, with the help of technology advances and recording of visuals are used as evidences. Every new technology like closed-circuit cameras, voice recorders, latest softwares etc. are being adopted and used by forensic researchers in this case will be an effort by Crime reconstruction to prove a crime.

 

Related journals of Crime Reconstruction

Journal of Forensic Research, Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Anthropology, Forensic Pathology Open Access, Indian Journal of Forensic Medicine and Toxicology, Journal of Punjab Academy of Forensic Medicine and Toxicology, Anil Aggrawal's Internet Journal of Forensic Medicine and Toxicology, Journal of Forensic Sciences

Physical Evidence

In a crime scene forensic experts look for physical evidence. The evidences, such as objects that found in crime scene are known as physical evidence. The physical evidences are like fingerprints, footprints, handprints, tidemarks, cut marks, tool marks, etc. These are collected carefully and examined in laboratory using forensic techniques.

Collection of physical evidence is an important any for crime investigation. Physical evidence could be described as a combination of trace elements, blood splatters, semen, visual understanding, voice recordings and criminal records, will be analysed by experts. Crime reconstruction paves the way for justice, with the help of technology advances are used as physical evidences. Every new technology like closed-circuit cameras, voice recorders, latest softwares etc. are being used to collect physical evidences.

Related journals of Physical Evidence

Journal of Forensic Research, Journal of Forensic Sciences

Crime

Crime is an act that against the law and will be punished by law. Murder, theft, rape, violence, terrorist activities etc. are considered as unlawful and person involved will be convicted and sentenced. Study of crime and criminals is criminology. Authorities protecting law would prove crime using evidences against them collected through forensic techniques.

In human society, in the process of gaining power and happiness, the rate of involving crime is being increasing. These crimes are categorised and specific laws have been designed with elegant rules and regulation to act these laws. Thus every crime has a punishment, but it should be proved with evidences. Proving these crimes will be done by law enforcement, with the help of forensic science.

Related journals of Crime 

Journal of Forensic Research, Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Anthropology, Forensic Pathology Open Access, Indian Journal of Forensic Medicine and Toxicology, Journal of Punjab Academy of Forensic Medicine and Toxicology, Anil Aggrawal's Internet Journal of Forensic Medicine and Toxicology, Journal of Forensic Sciences

 

Forensic Scientist

Forensic scientists are experts in the field of forensic science and work for developing new technologies by their eminent research. Forensic experts should be eminent and accurate, as their investigations results in evidence for a crime. Forensic scientists in laboratory examine different evidences and analyse results.

Forensic scientist is an expert who works for crime investigation. Forensic scientist could be described as a combination of expertise between science and criminal justice. Forensic scientist paves the way for justice, with the help of technology advances and by giving reliable evidences. Every cutting-edge technology used by forensic researcher will be an effort by Forensic scientist to prove a crime.

Related journals of Forensic Scientist

Journal of Forensic Research, Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Anthropology, Forensic Pathology Open Access, Indian Journal of Forensic Medicine and Toxicology,  Anil Aggrawal's Internet Journal of Forensic Medicine and Toxicology, Journal of Forensic Sciences

Fingerprint Analysis

In this world, it is proved that no two individuals have same fingerprints. In case of identical twins also the fingerprints differs and these fingerprints has an important analysis technique to solve crimes. Fingerprints analysis is old and unique technique serving enforcement field for more than 10 years.

In any crime, the major physical evidence will be used in the form of fingerprint analysis. In fingerprint analysis, data will be analysed using digital forensics. Every criminal will be updated with fingerprints, which are unique. Thus, by fingerprint analysis, the suspected criminals will be checked during similar crimes.

Related Journals of Fingerprint Analysis

Journal of Forensic Research, Journal of Forensic Science

Homicide

When a homicide is recognised, the forensic experts examine the corpse and this field is forensic pathology . The time of death, manner and cause of death are recognised by this analysis. In these cases human remains are special evidences to reveal truth using medical examination by post-mortem.

Homicide is considered as utmost crime in human society, in the process of gaining power and happiness. These crimes involving homicide are categorised and specific laws have been designed with elegant rules and regulation to act these laws. Thus homicide has a punishment, but it should be proved with evidences. Proving homicides will be done by law enforcement, with the help of forensic science.

Related Journals of Homicide

Journal of Forensic Research, Forensic medicine, Forensic Toxicology and Pharmacology, Forensic Pathology Open Access, Indian Journal of Forensic Medicine and Toxicology, Journal of Punjab Academy of Forensic Medicine and Toxicology,Anil Aggrawal's Internet Journal of Forensic Medicine and Toxicology, Forensic Science International: Genetics Supplement Series, Journal of Forensic Sciences

 

Handwriting Analysis

Study of handwriting analysis is known as Graphology. It is an effective and reliable indicator of personality and behaviour. In civil and violent crimes, the letters and documents are physical evidences. Forgery is mainly a significant fraud identified by handwriting analyst.

Handwriting analysis is an important subject for crime investigation. Handwriting analysis could be described as a combination of intellectual and criminal fraudulence. Handwriting analysis paves the way for justice, with the help of technology advances and recording of visuals are used as evidences. Every new technology like digital forensics are being adopted and used by forensic researchers in this case will be an effort by Handwriting analysis to prove a crime.

Related journals of Physical Evidence

Journal of Forensic Research, Journal of Forensic Sciences

  • 1.

    T. Abraham and O. de Vel, Investigative profiling with computer forensic log data and association rules, Proceedings of the IEEE International Conference on Data Mining, pp. 11–18, 2002.Google Scholar

  • 2.

    T. Abraham, R. Kling and O. de Vel, Investigative profile analysis with computer forensic log data using attribute generalization, Proceedings of the Fifteenth Australian Joint Conference on Artificial Intelligence, 2002.Google Scholar

  • 3.

    K. Bailey and K. Curran, An evaluation of image based steganography methods, International Journal of Digital Evidence, vol. 2(2), 2003.Google Scholar

  • 4.

    N. Beebe and J. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, vol. 2(2), pp. 147–167, 2005.CrossRefGoogle Scholar

  • 5.

    N. Beebe and J. Clark, Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 3–16, 2005.Google Scholar

  • 6.

    N. Beebe and J. Clark, Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results, Digital Investigation, vol. 4(S1), pp. 49–54, 2007.CrossRefGoogle Scholar

  • 7.

    N. Beebe, S. Stacy and D. Stuckey, Digital forensic implications of ZFS, to appear in Digital Investigation, 2009.Google Scholar

  • 8.

    D. Bem and E. Huebner, Computer forensic analysis in a virtual environment, International Journal of Digital Evidence, vol. 6(2), 2007.Google Scholar

  • 9.

    A. Burghardt and A. Feldman, Using the HFS+ journal for deleted file recovery, Digital Investigation, vol. 5(S1), pp. 76–82, 2008.CrossRefGoogle Scholar

  • 10.

    P. Burke and P. Craiger, Forensic analysis of Xbox consoles, in Advances in Digital Forensics III, P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 269–280, 2007.CrossRefGoogle Scholar

  • 11.

    M. Carney and M. Rogers, The Trojan made me do it: A first step in statistical based computer forensics event reconstruction, International Journal of Digital Evidence, vol. 2(4), 2004.Google Scholar

  • 12.

    B. Carrier, File System Forensic Analysis, Addison-Wesley, Boston, Massachusetts, 2005.Google Scholar

  • 13.

    H. Carvey, Tracking USB storage: Analysis of Windows artifacts generated by USB storage devices, Digital Investigation, vol. 2(2), pp. 94–100, 2005.CrossRefGoogle Scholar

  • 14.

    F. Casadei, A. Savoldi and P. Gubian, Forensics and SIM cards: An overview, International Journal of Digital Evidence, vol. 5(1), 2006.Google Scholar

  • 15.

    E. Casey, Error, uncertainty and loss in digital evidence, International Journal of Digital Evidence, vol. 1(2), 2002.Google Scholar

  • 16.

    M. Cohen, PyFlag – An advanced network forensic framework, Digital Investigation, vol. 5(S1), pp. 112–120, 2008.CrossRefGoogle Scholar

  • 17.

    P. Craiger, Recovering digital evidence from Linux systems, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 233–244, 2005.Google Scholar

  • 18.

    P. Craiger and P. Burke, Mac OS X forensics, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 159–170, 2006.CrossRefGoogle Scholar

  • 19.

    P. Craiger, P. Burke, C. Marberry and M. Pollitt, A virtual digital forensics laboratory, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 357–365, 2008.CrossRefGoogle Scholar

  • 20.

    M. Davis, G. Manes and S. Shenoi, A network-based architecture for storing digital evidence, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 33–43, 2005.Google Scholar

  • 21.

    O. de Vel, A. Anderson, M. Corney and G. Mohay, Mining email content for author identification forensics, ACM SIGMOD Record, vol. 30(4), pp. 55–64, 2001.CrossRefGoogle Scholar

  • 22.

    A. Distefano and G. Me, An overall assessment of mobile internal acquisition tool, Digital Investigation, vol. 5(S1), pp. 121–127, 2008.CrossRefGoogle Scholar

  • 23.

    B. Dolan-Gavitt, The VAD tree: A process-eye view of physical memory, Digital Investigation, vol. 4(S1), pp. 62–64, 2007.CrossRefGoogle Scholar

  • 24.

    B. Dolan-Gavitt, Forensic analysis of the Windows registry in memory, Digital Investigation, vol. 5(S1), pp. 26–32, 2008.CrossRefGoogle Scholar

  • 25.

    G. Dorn, C. Marberry, S. Conrad and P. Craiger, Analyzing the impact of a virtual machine on a host machine, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 69–81, 2009.CrossRefGoogle Scholar

  • 26.

    K. Eckstein and M. Jahnke, Data hiding in journaling file systems, Proceedings of the Fifth Digital Forensic Research Workshop, 2005.Google Scholar

  • 27.

    C. Hosmer and C. Hyde, Discovering covert digital evidence, Proceedings of the Third Digital Forensic Research Workshop, 2003.Google Scholar

  • 28.

    E. Huebner, D. Bem, F. Henskens and M. Wallis, Persistent systems techniques in forensic acquisition of memory, Digital Investigation, vol. 4(3-4), pp. 129–137, 2007.CrossRefGoogle Scholar

  • 29.

    J. Jackson, G. Gunsch, R. Claypoole and G. Lamont, Blind steganography detection using a computational immune system approach: A proposal, Proceedings of the Second Digital Forensic Research Workshop, 2002.Google Scholar

  • 30.

    W. Jansen and R. Ayers, An overview and analysis of PDA forensic tools, Digital Investigation, vol. 2(2), pp. 120–132, 2005.CrossRefGoogle Scholar

  • 31.

    R. Joyce, J. Powers and F. Adelstein, MEGA: A tool for Mac OS X operating system and application forensics, Digital Investigation, vol. 5(S1), pp. 83–90, 2008.CrossRefGoogle Scholar

  • 32.

    E. Kenneally and C. Brown, Risk sensitive digital evidence collection, Digital Investigation, vol. 2(2), pp. 101–119, 2005.CrossRefGoogle Scholar

  • 33.

    M. Kiley, T. Shinbara and M. Rogers, iPod forensics update, International Journal of Digital Evidence, vol. 6(1), 2007.Google Scholar

  • 34.

    J. Kornblum, Identifying almost identical files using context triggered piecewise hashing, Digital Investigation, vol. 3(S1), pp. 91–97, 2006.CrossRefGoogle Scholar

  • 35.

    J. Kornblum, Using every part of the buffalo in Windows memory analysis, Digital Investigation, vol. 4(1), pp. 24–29, 2007.CrossRefGoogle Scholar

  • 36.

    G. Kowalski and M. Maybury, Information Storage and Retrieval Systems: Theory and Implementation, Kluwer, Norwell, Massachusetts, 2000.Google Scholar

  • 37.

    C. Marsico and M. Rogers, iPod forensics, International Journal of Digital Evidence, vol. 4(2), 2005.Google Scholar

  • 38.

    L. Marziale, G. Richard and V. Roussev, Massive threading: Using GPUs to increase the performance of digital forensic tools, Digital Investigation, vol. 4(S1), pp. 73–81, 2007.CrossRefGoogle Scholar

  • 39.

    B. McBride, G. Peterson and S. Gustafson, A new blind method for detecting novel steganography, Digital Investigation, vol. 2(1), pp. 50–70, 2005.CrossRefGoogle Scholar

  • 40.

    K. McDonald, To image a Macintosh, Digital Investigation, vol. 2(3), pp. 175–179, 2005.CrossRefGoogle Scholar

  • 41.

    B. Mellars, Forensic examination of mobile phones, Digital Investigation, vol. 1(4), pp. 266–272, 2004.CrossRefGoogle Scholar

  • 42.

    S. Mukkamala and A. Sung, Identifying significant features for network forensic analysis using artificial intelligence techniques, International Journal of Digital Evidence, vol. 1(4), 2003.Google Scholar

  • 43.

    Net Applications, Global Market Share Statistics, Aliso Viejo, California (marketshare.hitslink.com), April 9, 2009.Google Scholar

  • 44.

    J. Nunamaker, N. Romano and R. Briggs, A framework for collaboration and knowledge management, Proceedings of the Thirty-Fourth Hawaii International Conference on System Sciences, 2001.Google Scholar

  • 45.

    M. Olivier, On metadata context in database forensics, Digital Investigation, vol. 5(3-4), pp. 115–123, 2009.CrossRefGoogle Scholar

  • 46.

    G. Palmer, A Road Map for Digital Forensic Research, DFRWS Technical Report, DTR-T001-01 Final, Air Force Research Laboratory, Rome, New York, 2001.Google Scholar

  • 47.

    G. Palmer, Forensic analysis in the digital world, International Journal of Digital Evidence, vol. 1(1), 2002.Google Scholar

  • 48.

    B. Park, J. Park and S. Lee, Data concealment and detection in Microsoft Office 2007 files, Digital Investigation, vol. 5(3-4), pp. 104–114, 2009.CrossRefGoogle Scholar

  • 49.

    M. Penhallurick, Methodologies for the use of VMware to boot cloned/mounted subject hard disks, Digital Investigation, vol. 2(3), pp. 209–222, 2005.CrossRefGoogle Scholar

  • 50.

    S. Piper, M. Davis, G. Manes and S. Shenoi, Detecting hidden data in EXT2/EXT3 file systems, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 245–256, 2005.Google Scholar

  • 51.

    M. Pollitt, K. Nance, B. Hay, R. Dodge, P. Craiger, P. Burke, C. Marberry and B. Brubaker, Virtualization and digital forensics: A research and teaching agenda, Journal of Digital Forensic Practice, vol. 2(2), pp. 62–73, 2008.CrossRefGoogle Scholar

  • 52.

    B. Rodriguez and G. Peterson, Detecting steganography using multi-class classification, in Advances in Digital Forensics III, P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 193–204, 2007.CrossRefGoogle Scholar

  • 53.

    B. Rodriguez, G. Peterson and K. Bauer, Fusion of steganalysis systems using Bayesian model averaging, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 345–355, 2008.CrossRefGoogle Scholar

  • 54.

    B. Rodriguez, G. Peterson, K. Bauer and S. Agaian, Steganalysis embedding percentage determination with learning vector quantization, Proceedings of the IEEE International Conference on Systems Man and Cybernetics, vol. 3, pp. 1861–1865, 2006.Google Scholar

  • 55.

    V. Roussev, Y. Chen, T. Bourg and G. Richard, md5bloom: Forensic file system hashing revisited, Digital Investigation, vol. 3(S1), pp. 82–90, 2006.CrossRefGoogle Scholar

  • 56.

    V. Roussev and G. Richard, Breaking the performance wall: The case for distributed digital forensics, Proceedings of the Fourth Digital Forensic Research Workshop, 2004.Google Scholar

  • 57.

    V. Roussev, G. Richard and L. Marziale, Multi-resolution similarity hashing, Digital Investigation, vol. 4(S1), pp. 105–113, 2007.CrossRefGoogle Scholar

  • 58.

    V. Roussev, G. Richard and L. Marziale, Class-aware similarity hashing for data classification, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 101–113, 2008.CrossRefGoogle Scholar

  • 59.

    V. Roussev, L. Wang, G. Richard and L. Marziale, A cloud computing platform for large-scale forensic computing, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 201–214, 2009.CrossRefGoogle Scholar

  • 60.

    P. Sanderson, Mass image classification, Digital Investigation, vol. 3(4), pp. 190–195, 2006.CrossRefGoogle Scholar

  • 61.

    A. Savoldi and P. Gubian, Data recovery from Windows CE based handheld devices, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 219–230, 2008.CrossRefGoogle Scholar

  • 62.

    A. Schuster, Searching for processes and threads in Microsoft Windows memory dumps, Digital Investigation, vol. 3(S1), pp. 10–16, 2006.CrossRefGoogle Scholar

  • 63.

    A. Schuster, The impact of Microsoft Windows pool allocation strategies on memory forensics, Digital Investigation, vol. 5(S1), pp. 58–64, 2008.CrossRefGoogle Scholar

  • 64.

    M. Shannon, Forensic relative strength scoring: ASCII and entropy scoring, International Journal of Digital Evidence, vol. 2(4), 2004.Google Scholar

  • 65.

    M. Sieffert, R. Forbes, C. Green, L. Popyack and T. Blake, Stego intrusion detection system, Proceedings of the Fourth Digital Forensic Research Workshop, 2004.Google Scholar

  • 66.

    H. Simon, Administrative Behavior, Macmillan, New York, 1947.Google Scholar

  • 67.

    J. Slay and A. Przibilla, iPod forensics: Forensically sound examination of an Apple iPod, Proceedings of the Fortieth Hawaii International Conference on System Sciences, 2007.Google Scholar

  • 68.

    J. Solomon, E. Huebner, D. Bem and M. Szezynska, User data persistence in physical memory, Digital Investigation, vol. 4(2), pp. 68–72, 2007.CrossRefGoogle Scholar

  • 69.

    A. Spruill and C. Pavan, Tackling the U3 trend with computer forensics, Digital Investigation, vol. 4(1), pp. 7–12, 2007.CrossRefGoogle Scholar

  • 70.

    C. Swenson, G. Manes and S. Shenoi, Imaging and analysis of GSM SIM cards, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 205–216, 2005.Google Scholar

  • 71.

    P. Turner, Unification of digital evidence from disparate sources (digital evidence bags), Proceedings of the Fifth Digital Forensic Research Workshop, 2005.Google Scholar

  • 72.

    P. Turner, Selective and intelligent imaging using digital evidence bags, Digital Investigation, vol. 3(S1), pp. 59–64, 2006.CrossRefGoogle Scholar

  • 73.

    R. van Baar, W. Alink and A. van Ballegooij, Forensic memory analysis: Files mapped in memory, Digital Investigation, vol. 5(S1), pp. 52–57, 2008.CrossRefGoogle Scholar

  • 74.

    C. Vaughan, Xbox security issues and forensic recovery methodology (utilizing Linux), Digital Investigation, vol. 1(3), pp. 165–172, 2004.CrossRefGoogle Scholar

  • 75.

    M. Weier, Hewlett-Packard data warehouse lands in Wal-Mart’s shopping cart, InformationWeek, August 4, 2007.Google Scholar

  • 76.

    S. Willassen, Forensic analysis of mobile phone internal memory, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 191–204, 2005.Google Scholar