Results 91 to 100 of about 66,060 (274)

Medical Cyber-Physical Systems Development: A Forensics-Driven Approach

open access: yes, 2017
The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors ...
Choo, Kim-Kwang Raymond   +2 more
core   +1 more source

The European honey buzzard (Pernis apivorus) as an ally for the control of the invasive yellow‐legged hornet (Vespa velutina nigrithorax)

open access: yesPest Management Science, Volume 81, Issue 4, Page 2237-2247, April 2025.
The predatory effect of the honey‐buzzard affects the reproductive performance of Asian‐hornet colonies, decreasing the density of workers over distance and time. The foraging distances of the honey‐buzzard concentrates within the first 2000 m from nest, which supports the results observed.
Jorge Ángel Martín‐Ávila   +3 more
wiley   +1 more source

Digital forensic

open access: yes, 2022
Data diambil dari lens ...
openaire   +1 more source

Digital Forensics Overview [PDF]

open access: yes, 2014
Digital Evaluation and Exploitation (DEEP): Research in "trusted" systems and ...
Garfinkel, Simson L.
core  

Combining Laser‐Induced Edition to Collision‐Induced Sequencing of Digital Oligomers in a Single Gas‐Phase Experiment

open access: yesRapid Communications in Mass Spectrometry, EarlyView.
ABSTRACT Rationale To increase the confidentiality level of molecular tags, binary information can be hidden in sequence‐defined oligomers using isobaric monomers including a photo‐sensitive one, which mass can be modified upon light irradiation. Reading such secured data requires light edition prior to MS/MS sequencing, which was investigated here in ...
Clothilde Comby‐Zerbino   +3 more
wiley   +1 more source

Working Inside The Box: An Example Of Google Desktop Search in a Forensic Examination

open access: yesJournal of Digital Forensics, Security and Law, 2011
Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades.
Timothy James LaTulippe
doaj  

Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection

open access: yesEgyptian Informatics Journal
With rapidly developing technology, digitalization environments are also expanding. Although this situation has many positive effects on daily life, the security vulnerabilities brought about by digitalization continue to be a major concern.
Ilhan Firat Kilincer
doaj   +1 more source

Research on outsourcing of digital image forensics based on privacy preserving

open access: yes网络与信息安全学报, 2016
The rapid growth of digital image forensics calls for outsourcing digital forensics services to the cloud.It meets the requirement of image content authentication from both the public and organizations.However,it also brings the privacy concerns over the
Bing-wen FENG,Jian WENG, Wei LU
doaj   +1 more source

Dataset construction challenges for digital forensics. [PDF]

open access: yesForensic Sci Int Digit Investig, 2021
Horsman G, Lyle JR.
europepmc   +1 more source

Home - About - Disclaimer - Privacy