Results 11 to 20 of about 66,758 (286)
HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi +2 more
doaj +1 more source
Advancing Digital Forensics [PDF]
The diversity of computing and communication systems used as well as the sheer volume of data processed in all aspects of personal, government, and commercial activities poses considerable challenges to law enforcement and particularly compliance officers.
Katrin Franke +2 more
openaire +2 more sources
A Case-Based Reasoning Method for Locating Evidence During Digital Forensic Device Triage [PDF]
The role of triage in digital forensics is disputed, with some practitioners questioning its reliability for identifying evidential data. Although successfully implemented in the field of medicine, triage has not established itself to the same degree in ...
Horsman, Graeme +2 more
core +1 more source
Deep Learning-Based Digital Image Forgery Detection System
The advancements of technology in every aspect of the current age are leading to the misuse of data. Researchers, therefore, face the challenging task of identifying these manipulated forms of data and distinguishing the real data from the manipulated ...
Emad Ul Haq Qazi +2 more
doaj +1 more source
Snap Forensics: A Tradeoff between Ephemeral Intelligence and Persistent Evidence Collection [PDF]
Digital evidence needs to be made persistent so that it can be used later. For citizen forensics, sometimes intelligence cannot or should not be made persistent forever.
Tun, Thein, Yu, Yijun
core +1 more source
digital forensic of criminology
Issues of vital criminological research and policy significance abound in the global South, with important implications for South/North relations and for global security and justice. Having a theoretical framework capable of appreciating the significance of this global dynamic will contribute to criminology being able to better understand the ...
openaire +2 more sources
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya +12 more
core +1 more source
Institut za medicinska istraživanja i medicinu rada: Izvještaj o radu u 2005. [PDF]
The field of digital forensics has emerged as one of the fastest changing and most rapidly developing investigative specialisations in a wide range of criminal and civil cases.
Hanaei, Ebrahim Hamad Al, Rashid, Awais
core +1 more source
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many network-based applications are utilized in different domains, e.g., health care, smart environments, and businesses.
Emad Ul Haq Qazi +2 more
doaj +1 more source
Semi-Supervised Contrastive Learning for Few-Shot Segmentation of Remote Sensing Images
Deep learning has been widely used in remote sensing image segmentation, while a lack of training data remains a significant issue. The few-shot segmentation of remote sensing images refers to the segmenting of novel classes with a few annotated samples.
Yadang Chen +4 more
doaj +1 more source

