Results 11 to 20 of about 2,970,764 (321)

A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection

open access: yesIEEE Transactions on Intelligent Vehicles, 2023
A modern vehicle has a complex internal architecture and is wirelessly connected to the Internet, other vehicles, and the infrastructure. The risk of cyber attacks and other criminal incidents along with recent road accidents caused by autonomous ...
Kim Strandberg   +2 more
semanticscholar   +1 more source

Faster MDNet for Visual Object Tracking

open access: yesApplied Sciences, 2022
With the rapid development of deep learning techniques, new breakthroughs have been made in deep learning-based object tracking methods. Although many approaches have achieved state-of-the-art results, existing methods still cannot fully satisfy ...
Qianqian Yu   +3 more
doaj   +1 more source

Study QoS Optimization and Energy Saving Techniques in Cloud, Fog, Edge, and IoT

open access: yesComplexity, 2020
With an increase of service users’ demands on high quality of services (QoS), more and more efficient service computing models are proposed. The development of cloud computing, fog computing, and edge computing brings a number of challenges, e.g., QoS ...
Zhiguo Qu   +4 more
doaj   +1 more source

Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey

open access: yesSensors, 2023
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart cities, various network technologies, such as the Internet and IoT,
Kyounggon Kim   +5 more
doaj   +1 more source

BSFCDet: Bidirectional Spatial–Semantic Fusion Network Coupled with Channel Attention for Object Detection in Satellite Images

open access: yesRemote Sensing, 2023
Due to the increasing maturity of deep learning and remote sensing technology, the performance of object detection in satellite images has significantly improved and plays an important role in military reconnaissance, urban planning, and agricultural ...
Xinchi Wei, Yan Zhang, Yuhui Zheng
doaj   +1 more source

A Case-Based Reasoning Method for Locating Evidence During Digital Forensic Device Triage [PDF]

open access: yes, 2014
The role of triage in digital forensics is disputed, with some practitioners questioning its reliability for identifying evidential data. Although successfully implemented in the field of medicine, triage has not established itself to the same degree in ...
Horsman, Graeme   +2 more
core   +1 more source

High-Speed Searching Target Data Traces Based on Statistical Sampling for Digital Forensics

open access: yesIEEE Access, 2019
As technology of manufacturing storage medium advances, data storage capacity has been increasing exponentially. This pervasiveness has made a forensic examination time-consuming and difficult. If a file system of data storage remains intact, an examiner
Doowon Jeong, Sangjin Lee
doaj   +1 more source

Digital Forensics AI: Evaluating, Standardizing and Optimizing Digital Evidence Mining Techniques

open access: yesKünstliche Intell., 2022
The impact of AI on numerous sectors of our society and its successes over the years indicate that it can assist in resolving a variety of complex digital forensics investigative problems.
A. Solanke, M. Biasiotti
semanticscholar   +1 more source

Rethinking Digital Forensics [PDF]

open access: yes, 2019
© IAER 2019In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour.
Jones, Andrew, Vidalis, Stilianos
core   +4 more sources

HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System

open access: yesApplied Sciences, 2023
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy