Results 91 to 100 of about 66,758 (286)
Technical reporting in digital forensics. [PDF]
Horsman G.
europepmc +1 more source
A review of digital forensics methods for JPEG file carving [PDF]
Digital forensics is an important field of cybersecurity and digital crimes investigation. It entails applying file recovery methods to analyze data from storage media and extract hidden, deleted or overwritten files.
Ahmad Khalid, Shamsul Kamal +3 more
core
The completion and output of NSFC‐funded medical projects reflect national strategic orientations and disciplinary development laws. It is suggested to establish a dynamic evaluation mechanism, promote the “basic research‐application‐transformation” collaborative model, support small‐scale yet high‐efficiency fields, and conduct long‐term tracking of ...
Hu Jin, Huang Hui, Bao Xinjie, Bai Hua
wiley +1 more source
Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection
With rapidly developing technology, digitalization environments are also expanding. Although this situation has many positive effects on daily life, the security vulnerabilities brought about by digitalization continue to be a major concern.
Ilhan Firat Kilincer
doaj +1 more source
Investigating the Effectiveness of Novel Support Vector Neural Network for Anomaly Detection in Digital Forensics Data. [PDF]
Islam U +6 more
europepmc +1 more source
Abstract Objective To define and demonstrate a step‐by‐step surgical anatomical approach to pudendal nerve dissection using female cadavers, focusing on the identification of safe roadmap and key neurovascular structures to optimize pelvic nerve surgery.
Merve Didem Eşkin Tanrıverdi +4 more
wiley +1 more source
Working Inside The Box: An Example Of Google Desktop Search in a Forensic Examination
Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades.
Timothy James LaTulippe
doaj
TNeXt: A convolutional neural network for remote harbor classification
Harbor recognition from aerial images faces two main challenges: deep models are often too large for real-time use on drones, and there is no large, diverse harbor dataset to train them.
Mert Gurturk +2 more
doaj +1 more source
Dataset construction challenges for digital forensics. [PDF]
Horsman G, Lyle JR.
europepmc +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source

