Results 61 to 70 of about 143,742 (178)

Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels

open access: yes, 2018
Forensic analysis of digital photo provenance relies on intrinsic traces left in the photograph at the time of its acquisition. Such analysis becomes unreliable after heavy post-processing, such as down-sampling and re-compression applied upon ...
Korus, Pawel, Memon, Nasir
core   +1 more source

A Game Theoretic Approach for Digital Forensic Tool Selection

open access: yesMathematics, 2020
Digital forensic investigations are getting harder and more time consuming everyday because of various problems including rapid advances in technology, wide variety of available devices in investigations, and large amount of data to be analyzed. In order
Umit Karabiyik, Tugba Karabiyik
doaj   +1 more source

A simple experiment with Microsoft Office 2010 and Windows 7 utilizing digital forensic methodology

open access: yesJournal of Digital Forensics, Security and Law, 2013
Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state.
Gregory H. Carlton
doaj  

Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive [PDF]

open access: yes
With the volume of digital forensic evidence rapidly increasing, this paper proposes a data reduction and data mining framework that incorporates a process of reducing data volume by focusing on a subset of information.
Darren Quick, Kim-Kwang Raymond Choo
core  

Perancangan Nenggala Disk Duplicator (Ndd) untuk Mendukung Proses Investigasi Forensik Digital [PDF]

open access: yes, 2018
The development of information technology simplify human life. Its evoke crime loopholes, cyber crime. When solving criminal cases that utilize information technology is required the digital forensic science. In carrying out a digital investigation known
Yudha, F. (Fietyata)
core  

Identifying bugs in digital forensic tools

open access: yes, 2014
Bugs can be found in all code and the consequences are usually managed through up-grade releases, patches, and restarting operating systems and applications.
Cusack, B, Homewood, A
core   +1 more source

digital forensic of criminology

open access: yes, 2022
Issues of vital criminological research and policy significance abound in the global South, with important implications for South/North relations and for global security and justice. Having a theoretical framework capable of appreciating the significance of this global dynamic will contribute to criminology being able to better understand the ...
openaire   +1 more source

Home - About - Disclaimer - Privacy