Results 31 to 40 of about 31,287 (164)

SEAKER: A mobile digital forensics triage device

open access: yesInternational Conference on Knowledge-Based Intelligent Information & Engineering Systems, 2019
As our world of digital devices continues to expand, the amount of digital evidence encountered by law enforcement during case investigation is ever increasing.
Eric Gentry, Michael Soltys
semanticscholar   +1 more source

Cyber Forensics - Computer and Mobile devices

open access: yes, 2021
The UK and India are natural partners as both strive to address the threats and challenges posed within the security sector, with a strong history of cooperation on a range of technologies. Deepening collaboration between UK and India academia, industry and governments in the field of education, research and innovation are key pillars of the UK-India ...
openaire   +1 more source

Metodología de análisis forense orientada a incidentes en dispositivos móviles

open access: yesMaskana, 2016
RESUMEN En el presente artículo se tratan temas relacionados con el análisis forense aplicado a dispositivos móviles, así como la propuesta y prueba de una metodología que apoye efectivamente estas actividades.
Diego Pinto
doaj  

Enhancing Face Recognition Model Performance Through HyperStyle-Driven Data Augmentation

open access: yesApplied Computational Intelligence and Soft Computing
Face recognition is a reliable biometric technology that utilizes artificial intelligence and computer vision to identify and verify an individual’s identity based on facial features.
Muhammad Chaidir   +3 more
doaj   +1 more source

Distinguishing Computer-generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning

open access: yes, 2018
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong   +4 more
core   +2 more sources

Locational wireless and social media-based surveillance [PDF]

open access: yes, 2014
The number of smartphones and tablets as well as the volume of traffic generated by these devices has been growing constantly over the past decade and this growth is predicted to continue at an increasing rate over the next five years.
Chernyshev, Maxim
core   +1 more source

Conceptual evidence collection and analysis methodology for Android devices

open access: yes, 2015
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android
Al Mutawa   +23 more
core   +1 more source

Provenance Threat Modeling

open access: yes, 2017
Provenance systems are used to capture history metadata, applications include ownership attribution and determining the quality of a particular data set.
Brooks, Richard R.   +5 more
core   +1 more source

Dark clouds on the horizon:the challenge of cloud forensics [PDF]

open access: yes, 2018
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian   +2 more
core   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy