Results 31 to 40 of about 31,287 (164)
SEAKER: A mobile digital forensics triage device
As our world of digital devices continues to expand, the amount of digital evidence encountered by law enforcement during case investigation is ever increasing.
Eric Gentry, Michael Soltys
semanticscholar +1 more source
Cyber Forensics - Computer and Mobile devices
The UK and India are natural partners as both strive to address the threats and challenges posed within the security sector, with a strong history of cooperation on a range of technologies. Deepening collaboration between UK and India academia, industry and governments in the field of education, research and innovation are key pillars of the UK-India ...
openaire +1 more source
Metodología de análisis forense orientada a incidentes en dispositivos móviles
RESUMEN En el presente artículo se tratan temas relacionados con el análisis forense aplicado a dispositivos móviles, así como la propuesta y prueba de una metodología que apoye efectivamente estas actividades.
Diego Pinto
doaj
Enhancing Face Recognition Model Performance Through HyperStyle-Driven Data Augmentation
Face recognition is a reliable biometric technology that utilizes artificial intelligence and computer vision to identify and verify an individual’s identity based on facial features.
Muhammad Chaidir +3 more
doaj +1 more source
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong +4 more
core +2 more sources
Locational wireless and social media-based surveillance [PDF]
The number of smartphones and tablets as well as the volume of traffic generated by these devices has been growing constantly over the past decade and this growth is predicted to continue at an increasing rate over the next five years.
Chernyshev, Maxim
core +1 more source
Conceptual evidence collection and analysis methodology for Android devices
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android
Al Mutawa +23 more
core +1 more source
Provenance systems are used to capture history metadata, applications include ownership attribution and determining the quality of a particular data set.
Brooks, Richard R. +5 more
core +1 more source
Dark clouds on the horizon:the challenge of cloud forensics [PDF]
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian +2 more
core +1 more source
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source

