<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article         dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Yönetim Bilişim Sistemleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2630-550X</issn>
                                        <issn pub-type="epub">2630-550X</issn>
                                                                                            <publisher>
                    <publisher-name>Dokuz Eylul University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                                                                                                                                            <title-group>
                                                                                                                        <article-title>ADLİ BİLİŞİMDE SİLİNMİŞ DOSYALARIN KURTARILMASI ÜZERİNE KARŞILAŞTIRMALI YÖNTEMLER</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                <name>
                                    <surname>Güllüce</surname>
                                    <given-names>YUSUF</given-names>
                                </name>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                <name>
                                    <surname>Benzer</surname>
                                    <given-names>Recep</given-names>
                                </name>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                <name>
                                    <surname>Çakır</surname>
                                    <given-names>Hüseyin</given-names>
                                </name>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20161019">
                    <day>10</day>
                    <month>19</month>
                    <year>2016</year>
                </pub-date>
                                        <volume>2</volume>
                                        <issue>2</issue>
                                        <fpage>19</fpage>
                                        <lpage>28</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20161018">
                        <day>10</day>
                        <month>18</month>
                        <year>2016</year>
                    </date>
                                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2015, </copyright-statement>
                    <copyright-year>2015</copyright-year>
                    <copyright-holder></copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Veri kurtarma çalışmalarında temel olarak iki yöntem uygulanır. Bunlardan birincisi dosya sistemlerinin analiz edilerek yapılan veri kurtarma çalışmaları, ikincisi ise dosyaların yapısal özelliklerinden yola çıkılarak yapılan çalışmalardır. Çalışmamızda öncelikle dosya sistemleri ve çalışmamızın konusu olan NTFS dosya sistemi hakkında bilgi verilmiştir. Daha sonra NTFS dosya sisteminde bir dosyanın oluşturulması ve silinmesi işlemlerinin arka planda ne şekilde gerçekleştiği ortaya konulmaya çalışılmıştır. Bu bağlamda veri kurtarma çalışmalarında uygulanan iki farklı yöntem, avantaj ve dezavantajları tartışıldıktan sonra örnek bir çalışma üzerinde uygulanmıştır.</p></abstract>
                                                                                    
            
                                                                                
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Cho, G.S. (2013). A computer forensic method for detecting timestamp forgery in NTFS, Computers &amp; Security 34:36-46.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Fellows, G.F. (2005). The joys of complexity and the deleted file Digital Investigation. 2:89-93.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Carrier, B. (2005). File System Forensic Analysis, 2005 Addison Wesley Professional.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Pal, A. Sencar, H.T., Memon, N. (2008). Detecting file fragmentation point using sequential hypothesis testing digital investigation. 2-13.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Mahant, S.H., Meshram, B.B. (2012). NTFS Deleted Files Recovery: Forensics View, IRACST - International Journal of Computer Science and Information Technology &amp; Security (IJCSITS), ISSN: 2249-9555 Vol. 2, No.3, June 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Gubanov, Y. (2012). Retrieving Digital Evidence: Methods, Techniques and Issues ForensicFocus, July 2012</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Beek, C. (2011). Introduction to File Carving, 2011, McAfee</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Bui, S. Enyeart, M. Luong, J. (2003). Issues in Computer Forensics, COEN 150 Dr. Holliday May 22, 2003. http://ntfs.com/ntfs-system-files.htm (LSoft Technologies Inc.).</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Medeiros, J. (2008). NTFS Forensics: A Programmers View of Raw Filesystem Data Extraction. 2008 Grayscale Research</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Russon, R. Fledel, Y. (2016). NTFS Documentation. http://ftp.kolibrios.org/users/Asper/docs/NTFS/ntfsdoc.html.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Alazab, M., Venkatraman, S., Watters, P. (2009). Effective Digıial Forensic Analysis Of The Ntfs Disk Image, Special Issue on ICIT 2009 Conference - Applied Computing.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
