Results 51 to 60 of about 21,877 (187)
ABSTRACT Rationale Ions trapped within a Penning cell (ICR) travel periodic orbits whose frequencies are dependent on their mass‐to‐charge ratio and the value of the magnetic field passing through the trap. Fourier transformation (FT‐ICR) decomposes the signal induced in the detection circuit by the rotation of the ions in the cell after the ...
Patrick Arpino, Michel Heninger
wiley +1 more source
Dark clouds on the horizon:the challenge of cloud forensics [PDF]
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian +2 more
core +1 more source
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core +1 more source
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
Forensic Diagnostics of the Circumstances of Digital Video and Audio Production: Analytical Review
The analytical review examines the issues of forensic investigation into the circumstances of production of digital video and audio recordings. The paper presents the organization and lines of inquiry in forensic analysis of video and audio evidence ...
M. A. Voznyuk, Yu. A. Denisov
doaj +1 more source
Abstract Police body‐worn cameras (BWCs) generate extensive video data on officer behavior, yet resource constraints mean that only a fraction of this footage is ever reviewed. Recent advancements in artificial intelligence (AI) present an opportunity to automate these reviews, potentially influencing police conduct.
Ian T. Adams +2 more
wiley +1 more source
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits
Position scrambling (permutation) is widely used in multimedia encryption schemes and some international encryption standards, such as the Data Encryption Standard and the Advanced Encryption Standard.
Li, Chengqing, Lin, Dongdong, Lü, Jinhu
core +1 more source
Enhancing Gun Detection With Transfer Learning and YAMNet Audio Classification
Identification of the type of gun used is essential in several fields, including forensics, the military, and defense. In this research, one of the powerful deep learning architectures is applied to identify several types of firearms based on their ...
N. Harihara Valliappan +2 more
doaj +1 more source
Spectrogram Dataset of Korean Smartphone Audio Files Forged Using the “Mix Paste” Command
This study focuses on the field of voice forgery detection, which is increasing in importance owing to the introduction of advanced voice editing technologies and the proliferation of smartphones.
Yeongmin Son, Won Jun Kwak, Jae Wan Park
doaj +1 more source
ABSTRACT CPA enabling competencies underpin the human skills and professional values that all future accountants should possess. Nevertheless, to date, the discourse is limited within the scholarship of teaching and learning on how to best inculcate these competencies in future accountants.
Sanobar Siddiqui
wiley +1 more source

