Results 91 to 100 of about 66,758 (286)

A review of digital forensics methods for JPEG file carving [PDF]

open access: yes, 2018
Digital forensics is an important field of cybersecurity and digital crimes investigation. It entails applying file recovery methods to analyze data from storage media and extract hidden, deleted or overwritten files.
Ahmad Khalid, Shamsul Kamal   +3 more
core  

Analysis of Research Trends and Output Effectiveness in the Medical Field Based on the National Natural Science Foundation of China

open access: yesHealth Care Science, EarlyView.
The completion and output of NSFC‐funded medical projects reflect national strategic orientations and disciplinary development laws. It is suggested to establish a dynamic evaluation mechanism, promote the “basic research‐application‐transformation” collaborative model, support small‐scale yet high‐efficiency fields, and conduct long‐term tracking of ...
Hu Jin, Huang Hui, Bao Xinjie, Bai Hua
wiley   +1 more source

Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection

open access: yesEgyptian Informatics Journal
With rapidly developing technology, digitalization environments are also expanding. Although this situation has many positive effects on daily life, the security vulnerabilities brought about by digitalization continue to be a major concern.
Ilhan Firat Kilincer
doaj   +1 more source

Applied surgical anatomical approach to pudendal nerve: Step‐by‐step key neurovascular structures for pelvic nerve surgery

open access: yesInternational Journal of Gynecology &Obstetrics, EarlyView.
Abstract Objective To define and demonstrate a step‐by‐step surgical anatomical approach to pudendal nerve dissection using female cadavers, focusing on the identification of safe roadmap and key neurovascular structures to optimize pelvic nerve surgery.
Merve Didem Eşkin Tanrıverdi   +4 more
wiley   +1 more source

Working Inside The Box: An Example Of Google Desktop Search in a Forensic Examination

open access: yesJournal of Digital Forensics, Security and Law, 2011
Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades.
Timothy James LaTulippe
doaj  

TNeXt: A convolutional neural network for remote harbor classification

open access: yesAin Shams Engineering Journal
Harbor recognition from aerial images faces two main challenges: deep models are often too large for real-time use on drones, and there is no large, diverse harbor dataset to train them.
Mert Gurturk   +2 more
doaj   +1 more source

Dataset construction challenges for digital forensics. [PDF]

open access: yesForensic Sci Int Digit Investig, 2021
Horsman G, Lyle JR.
europepmc   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Home - About - Disclaimer - Privacy