Results 21 to 30 of about 2,970,764 (321)
Digital Forensics Subdomains: The State of the Art and Future Directions
For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident.
Arafat Al-dhaqm +7 more
semanticscholar +1 more source
Institut za medicinska istraživanja i medicinu rada: Izvještaj o radu u 2005. [PDF]
The field of digital forensics has emerged as one of the fastest changing and most rapidly developing investigative specialisations in a wide range of criminal and civil cases.
Hanaei, Ebrahim Hamad Al, Rashid, Awais
core +1 more source
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya +12 more
core +1 more source
This chapter describes a network discovery technique on the basis of websites sharing the same Google Analytics and/or AdSense IDs.
+5 more sources
Deep Learning-Based Digital Image Forgery Detection System
The advancements of technology in every aspect of the current age are leading to the misuse of data. Researchers, therefore, face the challenging task of identifying these manipulated forms of data and distinguishing the real data from the manipulated ...
Emad Ul Haq Qazi +2 more
doaj +1 more source
Using smartphones as a proxy for forensic evidence contained in cloud storage services [PDF]
Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities.
Glisson, W., Grispos, G., Storer, T.
core +2 more sources
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many network-based applications are utilized in different domains, e.g., health care, smart environments, and businesses.
Emad Ul Haq Qazi +2 more
doaj +1 more source
Snap Forensics: A Tradeoff between Ephemeral Intelligence and Persistent Evidence Collection [PDF]
Digital evidence needs to be made persistent so that it can be used later. For citizen forensics, sometimes intelligence cannot or should not be made persistent forever.
Tun, Thein, Yu, Yijun
core +1 more source
Semi-Supervised Contrastive Learning for Few-Shot Segmentation of Remote Sensing Images
Deep learning has been widely used in remote sensing image segmentation, while a lack of training data remains a significant issue. The few-shot segmentation of remote sensing images refers to the segmenting of novel classes with a few annotated samples.
Yadang Chen +4 more
doaj +1 more source
FF-BTP Model for Novel Sound-Based Community Emotion Detection
Most emotion classification schemes to date have concentrated on individual inputs rather than crowd-level signals. In addressing this gap, we introduce Sound-based Community Emotion Recognition (SCED) as a fresh challenge in the machine learning domain.
Arif Metehan Yildiz +8 more
doaj +1 more source

