Results 101 to 110 of about 31,287 (164)
ASMF: Ambient social media forensics chain of custody with an intelligent digital investigation process using federated learning. [PDF]
Khan AA +5 more
europepmc +1 more source
Prioritising Microbiology in Secondary Education Addresses Emerging Scientific-Social-Educational Challenges and Competency Needs. [PDF]
Amorim L, Santos C, Timmis K.
europepmc +1 more source
A lightweight deep evidence fusion framework for smart home appliance detection and classification via internet of things devices. [PDF]
Alruwais N +7 more
europepmc +1 more source
A robust and dynamic malware detection and classification model using behavioral-based analysis and BERT technique. [PDF]
Alhazmi AH.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
SPIE Proceedings, 2013
The growth of Android in the mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with mobile devices in their own IT infrastructure. To respond to these incidents, it is important to have professional trained staff.
Knut Kröger, Reiner Creutzburg
openaire +2 more sources
The growth of Android in the mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with mobile devices in their own IT infrastructure. To respond to these incidents, it is important to have professional trained staff.
Knut Kröger, Reiner Creutzburg
openaire +2 more sources
SPIE Proceedings, 2014
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure.
Knut Kröger, Reiner Creutzburg
openaire +2 more sources
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure.
Knut Kröger, Reiner Creutzburg
openaire +2 more sources
SPIE Proceedings, 2012
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to
Knut Kröger, Reiner Creutzburg
openaire +2 more sources
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to
Knut Kröger, Reiner Creutzburg
openaire +2 more sources

