Home > CSC-OpenAccess Library > Manuscript Information
This is an Open Access publication published under CSC-OpenAccess Policy.

Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
EXPLORE PUBLICATIONS BY COUNTRIES |
![]() |
![]() |
EUROPE |
![]() |
MIDDLE EAST |
![]() |
ASIA |
![]() |
AFRICA |
............................. | |
![]() |
United States of America |
![]() |
United Kingdom |
![]() |
Canada |
![]() |
Australia |
![]() |
Italy |
![]() |
France |
![]() |
Brazil |
![]() |
Germany |
![]() |
Malaysia |
![]() |
Turkey |
![]() |
China |
![]() |
Taiwan |
![]() |
Japan |
![]() |
Saudi Arabia |
![]() |
Jordan |
![]() |
Egypt |
![]() |
United Arab Emirates |
![]() |
India |
![]() |
Nigeria |
Techniques in Computer Forensics: A Recovery Perspective
Bhanu Prakash Battula, KeziaRani , Satya Prasad , T. Sudha
Pages - 27 - 35 | Revised - 05-05-2009 | Published - 18-05-2009
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Computer Forensics, Fraud, Disks
ABSTRACT
Computer forensics has recently gained significant popularity with many local law
enforcement agencies. It is currently employed in fraud, theft, drug enforcement
and almost every other enforcement activity. The research paper includes the
types of attempts to destroy or tamper the files by the culprits and unleashes
various recovery techniques, and their significance in different situations from
those attempts, which destroy files or inflict physical damage to the computer.
The paper also presents the nature and immediate need of enhancing the
existing automated forensics tools. The paper gives a quick glance of various
methods used by culprits to destroy the information in the electronic storage
media and their corresponding forensic approach done by the computer forensic
experts in the perspective of recovery.
1 | Bhosale, D. V., Mitkal, P. K., Pawar, R. N., & Paranjape, R. S. (2016). Review on Computer Forensic. Training, 2(01). |
2 | Çakir, H., & Kiliç, M. S. (2016). The keyword search method and its importance in computer forensics Adli bilisimde anahtar kelime aramasi metodu ve önemi. Journal of Human Sciences, 13(1), 2368-2384. |
3 | Velakanti, G., & Katuri, A. (2014). Enhancement of Existing Tools and Techniques for Computer Forensic Investigation. International Journal of Computer Science and Network Security (IJCSNS), 14(12), 74. |
4 | Bryant, M. S., & Bryant, R. (Eds.). (2014). Policing Digital Crime. Ashgate Publishing, Ltd.. |
5 | Khoury, I., & Caushaj, E.computer forensic. |
6 | Andrade, M., & Ferreira, M. A. M. (2009). Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74. |
1 | www.porcupine.org/forensics/tct.html |
2 | www.forensicswiki.org/wiki/ILook |
3 | www.sleuthkit.org/ |
4 | www.accessdata.com |
5 | http://www.digitalintelligence.com/software/disoftware/drivespy/ |
6 | http://en.wikipedia.org/wiki/EnCase. |
7 | http://www.x-ways.net/forensics/index-m.html. |
8 | David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”, |
9 | David Icove, Karl Seqer, William Von Storch, “Computer crime: A Crime-figher’s Handbook”, O'Reilly Media, Inc, USA (1 Aug 1995). |
10 | Wofle, Henry B, Computers and Security, El sevier Science, Ltd, pp. 26-28. |
11 | http://www.forensics.com |
12 | Thomas Rude CISSP, “Evidence Seizure Methodology for Computer Forensics”. |
13 | http://www.computerforensics.net/forensics.htm |
14 | Nelson, Bill, Philips, Amelia, Enfinger, Frank and Stewart, Chris, “Guide to Computer Forensics and Investigations”, Thomson, Cousre Technology, Boston, 2004. |
15 | Anthony Verducci, “How to Absolutely, Positively Destroy Your Data”: DIY Tech, February 2007. |
16 | Michele C. S. Lange, Kristin M. Nimsger, ‘’Electronic evidence and discovery’’, American Bar Association, 2004. |
17 | Dinan, Thomas Edward, Robertson, Neil Leslie, Tam, Alan Jun-yuan, “Magnetic head for hard disk drive having varied composition nickel-iron alloy magnetic poles”, U.S. Patent No. 6,912,771. July 5, 2005. |
18 | Andrew S.Tanenbaum, “Modern Operating Systems” Prentice Hall, Dec. 2007 |
19 | Guy Hart-Davis,”Windows(R) XP Professional: The Complete Reference” McGraw-Hill Osborne, Dec. 2002. |
20 | Peterson, Siberschaz, Galvin, “Secondary Storage Structure, Advanced Operating |
21 | Charles H Sobey, “Recovering unrecoverable data”, Channel Science white paper, 14th April 2004. |
22 | S.Berinato, “Good Stuff Cheap”, CIO, 15 Oct.2002 pp 53-59. |
23 | M. Villano, “Hard-Drive Magic: Making Data Disappear Forever”, New York |
24 | Simson L. Garfinkel and Abhi Shelat, “Remembrance of Data Passed: A Study of Disk Sanitization Practices”, IEEE Security & Privacy, Vol. 1, 2003, pp. 17-27. |
25 | G.Shpantzer and T.Ipsen, “Law Enforcement Challenges in Digital Forensics.” Proc. |
26 | Thomas Welch, “Handbook of information Security Management”, CRC Press LLC, |
27 | Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal |
Mr. Bhanu Prakash Battula
- India
Mr. KeziaRani
- India
Mr. Satya Prasad
- India
Mr. T. Sudha
- India
thatimakula_sudha@yahoo.com