Results 121 to 130 of about 2,970,764 (321)
A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks. [PDF]
Arshad H +5 more
europepmc +1 more source
A comparison of forensic toolkits and mass market data recovery applications [PDF]
Digital forensic application suites are large, expensive, complex software products, offering a range of functions to assist in the investigation of digital artifacts.
Buchanan-Wollaston, J. +2 more
core
Large palynological collections have been built over decades and contain vital information. However, they are often difficult to access and use effectively. What is the point of having such collections if they are not fully utilizable? To solve this problem, we digitized the Smithsonian palynological collection using both light and confocal microscopy.
Carlos Jaramillo +37 more
wiley +1 more source
People use social media for both good and distasteful purposes. When used with malicious intent, it raises significant concerns as it involves the use of offensive language and hate speech that promote terrorism and other negative behaviors.
Mohamed Safwan Saalik Shah +2 more
doaj +1 more source
Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition. [PDF]
Naeem MR +3 more
europepmc +1 more source
Survey on remnant data research: the artefacts recovered and the implications in a cyber security conscious world [PDF]
The prevalence of remnant data in second hand storage media is well documented. Since 2004 there have been ten separate papers released through Edith Cowan University alone.
James, Michael, Szewczyk, Patryk
core +1 more source
The predatory effect of the honey‐buzzard affects the reproductive performance of Asian‐hornet colonies, decreasing the density of workers over distance and time. The foraging distances of the honey‐buzzard concentrates within the first 2000 m from nest, which supports the results observed.
Jorge Ángel Martín‐Ávila +3 more
wiley +1 more source
From Fingers to Faces: Visual Semiotics and Digital Forensics. [PDF]
Leone M.
europepmc +1 more source
ABSTRACT Rationale To increase the confidentiality level of molecular tags, binary information can be hidden in sequence‐defined oligomers using isobaric monomers including a photo‐sensitive one, which mass can be modified upon light irradiation. Reading such secured data requires light edition prior to MS/MS sequencing, which was investigated here in ...
Clothilde Comby‐Zerbino +3 more
wiley +1 more source
Digital Forensics in Action The Role of Digital Forensics in Cybercrime Investigations
The explosion of technology in recent years has revolutionized the face of cybercrime and requires new and innovative approaches to investigating digital crimes.
Hassan Shah Khan +2 more
doaj +3 more sources

