Results 21 to 30 of about 31,287 (164)
A framework for the forensic investigation of unstructured email relationship data [PDF]
Our continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data.
Haggerty, J +3 more
core +1 more source
Here we describe the first report of using low-cost cellular or web-based digital cameras to image and quantify standardized rapid immunoassay strips as a new point-of-care diagnostic and forensics tool with health applications.
Brian A. Cadle +6 more
doaj +1 more source
Predictive biometrics: A review and analysis of predicting personal characteristics from biometric data [PDF]
Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to ...
Abreu M.C.C. +31 more
core +1 more source
Mobile Forensics: Android Platforms and WhatsApp Extraction Tools
Today, mobile phones are ones of the technologies that most troublesome and popularity of steadily gaining with better productivity, connectivity, and functionality.
S. Alhidaifi
semanticscholar +1 more source
Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core +1 more source
Security and computer forensics in web engineering education [PDF]
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core
Digital forensics techniques and trends: a review
The research work presented in this paper aims to review Digital Forensics (DF) techniques and trends. As computer technology advances day by day, the chances of data being misused and tampered with are also growing daily.
Himanshu Dubey +2 more
semanticscholar +1 more source
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach
The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors ...
Choo, Kim-Kwang Raymond +2 more
core +1 more source
EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution
Education and training in digital forensics requires a variety of suitable challenge corpora containing realistic features including regular wear-and-tear, background noise, and the actual digital traces to be discovered during investigation.
Du, Xiaoyu, Lillis, David, Scanlon, Mark
core +1 more source
A Forensically Sound Adversary Model for Mobile Devices
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and
Choo, Kim-Kwang Raymond +2 more
core +2 more sources

