Results 131 to 140 of about 2,970,764 (321)

iPhone forensics methodology and tools [PDF]

open access: yes, 2008
iPhone mobile devices are rapidly overtaking the new generation of mobile phones market, especially among the young generation. It is also gaining a lot of popularity among security specialists and fancy gadgets for collectors.
Al-Hajri, Haitham, Sansurooah, Krishnun
core   +1 more source

Sonified Signals From a Compact FT‐ICR Instrument: A Feasibility Study. I—Data Mapping to an Equal‐Tempered Chromatic Scale

open access: yesRapid Communications in Mass Spectrometry, EarlyView.
ABSTRACT Rationale Ions trapped within a Penning cell (ICR) travel periodic orbits whose frequencies are dependent on their mass‐to‐charge ratio and the value of the magnetic field passing through the trap. Fourier transformation (FT‐ICR) decomposes the signal induced in the detection circuit by the rotation of the ions in the cell after the ...
Patrick Arpino, Michel Heninger
wiley   +1 more source

Enhancing Ransomware Threat Detection: Risk-Aware Classification via Windows API Call Analysis and Hybrid ML/DL Models

open access: yesJournal of Cybersecurity and Privacy
Ransomware attacks pose a serious threat to computer networks, causing widespread disruption to individual, corporate, governmental, and critical national infrastructures.
Sarah Alhuwayshil   +2 more
doaj   +1 more source

Investigation of the laser fluence and wavelength dependence in surface‐assisted laser desorption/ionization mass spectrometry using gold nanoparticles

open access: yesRapid Communications in Mass Spectrometry, EarlyView.
Rationale Surface‐assisted laser desorption/ionization (SALDI) mass spectrometry (MS) builds on the use of nanostructured surfaces (e.g., coatings of colloidal nanoparticles) to promote analyte desorption and ionization. The SALDI process is believed to occur mainly through thermal processes, resulting from heating of the nanosubstrate upon absorption ...
Wendy H. Müller   +3 more
wiley   +1 more source

The case for Zero Trust Digital Forensics [PDF]

open access: yesDigital Investigation. The International Journal of Digital Forensics and Incident Response, 2022
Christoper Neale   +3 more
semanticscholar   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Digital Forensics

open access: yesJournal of Japan Society for Fuzzy Theory and Intelligent Informatics, 2007
Jack Wiles, Anthony Reyes
  +5 more sources

Detection of community emotions through Sound: An Investigation using the FF-Orbital Chaos-Based feature extraction model

open access: yesAin Shams Engineering Journal
Community Emotion Detection (CED) is important to public safety and sound forensics. It enables the analysis of collective emotions in dynamic environments such as public events, protests, and emergencies.This research presents a new, cost-effective ...
Li Xu   +5 more
doaj   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, EarlyView.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy