Results 231 to 240 of about 66,758 (286)
Forensics System for Internet of Vehicles Based on Post-Quantum Blockchain. [PDF]
Zhang Z, Cao Z, Wang Y.
europepmc +1 more source
Some Results on Cumulative Residual Inaccuracy Measure of k-Record Values. [PDF]
Goel R, Kumar V, Vehale S, Scott TC.
europepmc +1 more source
"A Ronin Without a Master": Exploring Police Perspectives on Digital Evidence in England and Wales. [PDF]
Ng M, Medhurst R, Dando CJ, Bull R.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Security & Privacy Magazine, 2009
This issue is one of a pair of coordinated special issues on digital forensics by IEEE Security & Privacy and IEEE Signal Processing Magazine. S&P's special issue has articles debating the effectiveness of forensics, on capturing live forensics analysis of computers, on the new Microsoft Office file formats and their implications on forensics, on ...
Michael A. Caloyannides +2 more
openaire +1 more source
This issue is one of a pair of coordinated special issues on digital forensics by IEEE Security & Privacy and IEEE Signal Processing Magazine. S&P's special issue has articles debating the effectiveness of forensics, on capturing live forensics analysis of computers, on the new Microsoft Office file formats and their implications on forensics, on ...
Michael A. Caloyannides +2 more
openaire +1 more source
Digital Forensics: Focusing on Image Forensics
2019 7th International Symposium on Digital Forensics and Security (ISDFS), 2019The world is continuously developing, and people's needs are increasing as well; so too are the number of thieves increasing, especially electronic thieves. For that reason, companies and individuals are always searching for experts who will protect them from thieves, and these experts are called digital investigators. Digital forensics has a number of
Rayan Sulaiman Khalaf, Asaf Varol
openaire +1 more source
Digital Forensics for Eucalyptus
2011 Frontiers of Information Technology, 2011Cloud computing is a computing paradigm that shifts drastically from traditional computing architecture. Although this new computing paradigm brings many advantages like utility computing model but the design in not flawless and hence suffers from not only many known computer vulnerabilities but also introduces unique information confidentiality ...
Zafarullah, Faiza Anwar, Zahid Anwar
openaire +1 more source
Forensics of digital librarianship
OCLC Systems & Services: International digital library perspectives, 2011PurposeThis paper seeks to examine important issues relating to digital preservation with a focus on file integrity and digital forensics.Design/methodology/approachThis is a viewpoint paper.FindingsThis paper highlights important issues relating to digital preservation and offers suggestions on comprehensive approaches to achieving a high level of ...
openaire +1 more source

