Results 21 to 30 of about 31,287 (164)

A framework for the forensic investigation of unstructured email relationship data [PDF]

open access: yes, 2011
Our continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data.
Haggerty, J   +3 more
core   +1 more source

Cellular Phone-Based Image Acquisition and Quantitative Ratiometric Method for Detecting Cocaine and Benzoylecgonine for Biological and Forensic Applications

open access: yesSubstance Abuse: Research and Treatment, 2010
Here we describe the first report of using low-cost cellular or web-based digital cameras to image and quantify standardized rapid immunoassay strips as a new point-of-care diagnostic and forensics tool with health applications.
Brian A. Cadle   +6 more
doaj   +1 more source

Predictive biometrics: A review and analysis of predicting personal characteristics from biometric data [PDF]

open access: yes, 2017
Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to ...
Abreu M.C.C.   +31 more
core   +1 more source

Mobile Forensics: Android Platforms and WhatsApp Extraction Tools

open access: yesInternational Journal of Computer Applications, 2018
Today, mobile phones are ones of the technologies that most troublesome and popularity of steadily gaining with better productivity, connectivity, and functionality.
S. Alhidaifi
semanticscholar   +1 more source

Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]

open access: yes, 2014
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core   +1 more source

Security and computer forensics in web engineering education [PDF]

open access: yes, 2010
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core  

Digital forensics techniques and trends: a review

open access: yes˜The œinternational Arab journal of information technology, 2023
The research work presented in this paper aims to review Digital Forensics (DF) techniques and trends. As computer technology advances day by day, the chances of data being misused and tampered with are also growing daily.
Himanshu Dubey   +2 more
semanticscholar   +1 more source

Medical Cyber-Physical Systems Development: A Forensics-Driven Approach

open access: yes, 2017
The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors ...
Choo, Kim-Kwang Raymond   +2 more
core   +1 more source

EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution

open access: yes, 2017
Education and training in digital forensics requires a variety of suitable challenge corpora containing realistic features including regular wear-and-tear, background noise, and the actual digital traces to be discovered during investigation.
Du, Xiaoyu, Lillis, David, Scanlon, Mark
core   +1 more source

A Forensically Sound Adversary Model for Mobile Devices

open access: yes, 2015
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and
Choo, Kim-Kwang Raymond   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy