Results 71 to 80 of about 43,462 (194)
Dark clouds on the horizon:the challenge of cloud forensics [PDF]
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian +2 more
core +1 more source
Did They Ever Stand a Chance? Understanding Police Interrogations of Juveniles [PDF]
The Miranda v. Arizona (1966) decision was a pivotal case in the United States. It afforded rights to suspects and defendants against self-incrimination and representation during police interrogations.
Werner, Brian
core +1 more source
Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core +1 more source
The Parrot Brief: a drawing guide for first-year architecture students [PDF]
The Parrot Brief is an audio drawing guide for first-year architecture students, devised in MP3 format, which received university learning and teaching innovation funding.
Cobo, Adriana
core
Deep Sketch-Photo Face Recognition Assisted by Facial Attributes
In this paper, we present a deep coupled framework to address the problem of matching sketch image against a gallery of mugshots. Face sketches have the essential in- formation about the spatial topology and geometric details of faces while missing some ...
Dabouei, Ali +4 more
core +1 more source
ENFSI Forensic Speech and Audio Analysis Working Group meeting (Lisbon, Portugal)
The paper reports on the outcomes of the 19TH Annual Meeting of the ENFSI Working Group for Forensic Speech and Audio Analysis that took place in Portugal in September ...
F. O. Bairamova
doaj
On Practical Issues of Electric Network Frequency Based Audio Forensics
The transmission frequency of power grids, i.e., electric network frequency (ENF), has become a common criterion to authenticate audio recordings during the past decade, drawing much attention from both the academic researchers and law enforcement ...
Guang Hua +2 more
doaj +1 more source
Secure Audio Forensic Marking Alogrithm Using 2D Barcode in DWT-DFRNT Domain
We created a robust and secure forensic marking algorithm through the process of hiding information in a two-dimensional (2D) barcode and embedding it into the discrete wavelet transformation-discrete fractional random transformation (DWT-DFRNT) domain ...
De Li, JongWeon Kim
doaj +1 more source
A comparison of forensic toolkits and mass market data recovery applications [PDF]
Digital forensic application suites are large, expensive, complex software products, offering a range of functions to assist in the investigation of digital artifacts.
Buchanan-Wollaston, J. +2 more
core

