Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
Published Date
Displaying 476 - 500 of 540

Guide to Integrating Forensic Techniques into Incident Response

September 1, 2006
Author(s)
Timothy Grance, Suzanne Chevalier, Karen A. Scarfone, Hung Dang
This publication is intended to help organizations in investigating computer security incidents and troubleshooting some information technology (IT) operational problems by providing practical guidance on performing computer and network forensics. The

Forensic Tools for Mobile Phone Subscriber Identity Modules

May 31, 2006
Author(s)
Wayne Jansen, Richard Ayers
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones

Forensic Software Tools for Cell Phone Subscriber Identity Modules

April 3, 2006
Author(s)
Wayne Jansen, Richard Ayers
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones

Setting standards and developing technology to aid the human identity testing community

April 1, 2006
Author(s)
John M. Butler, Michael D. Coble, Amy E. Decker, David L. Duewer, Carolyn R. Steffen, Margaret C. Kline, Janette W. Redman, Peter Vallone
Our project team at the U.S. National Institute of Standards and Technology (NIST) is funded by the National Institute of Justice (NIJ) to conduct research that benefits the human identity testing community and to create tools that enable forensic DNA

Analysis of DNA Single Nucleotide Polymorphisms by Mass Spectrometry

March 17, 2006
Author(s)
Peter Vallone, John Butler
Single nucleotide polymorphisms(SNP) are the most frequent form of DNA sequence variation in the human genome and are becoming increasingly useful as genetic markers for genome mapping studies, medical diagnostics, and human identity testing. The primer

Effective Strategies for Forensic Analysis in the Mitochondrial DNA Coding Region

January 1, 2006
Author(s)
Michael D. Coble, Peter Vallone, Rebecca S. Just, Toni M. Diegoli, Brion C. Smith, T. J. Parsons
Recently, it has been recognized that accessing information in the mitochondrial DNA (mtDNA) coding region can provide additional forensic discrimination with respect to the standard typing of the D-loop region, augmenting the sometimes rather limited

Topography Measurements and Applications

January 1, 2006
Author(s)
Jun-Feng Song, Theodore V. Vorburger
Based on auto- and cross-correlation functions (ACF and CCF), a new surface parameter called profile (or topography) difference, Ds, has been developed for quantifying differences between 2D profiles or between 3D topographies with a single number. When Ds

Cell Phone Forensics Tools: An Overview and Analysis

October 19, 2005
Author(s)
Richard Ayers, Wayne Jansen, Nicolas Cilleros, Ronan Daniellou
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistants (PDAs) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Message

Approach to Modeling Flame Spread Over Polyurethane Foam-Covered Walls. (POSTER ABSTRACTS)

September 1, 2005
Author(s)
Daniel M. Madrzykowski, Stephen Kerber, Nelson P. Bryner, William L. Grosshandler
Computer simulation has been demonstrated to be credible, when properly applied, as a tool to help fill in critical details of a fire incident and to demonstrate the value of alternative building designs and fire safety measures. This poster presents the

An Overview and Analysis of PDA Forensic Tools

April 2, 2005
Author(s)
Wayne Jansen, Richard Ayers
Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidence

Second Harmonic Magneto-Resistive Imaging to Authenticate and Recover Data from Magnetic Storage Media

March 1, 2005
Author(s)
David P. Pappas, Alexey Nazarov, D Stevenson, Steven Voran, Mike E. Read, Erin M. Gormley, James Cash, Ken Marr, James Ryan
A scanning magneto-resistive (MR) microscope was developed for high resolution imaging of magnetic tapes and digital media. Second harmonic detection was used to remove thermal anomalies. We were able to image sufficient lengths of tape for authentication
Was this page helpful?