Results 21 to 30 of about 66,758 (286)

Using smartphones as a proxy for forensic evidence contained in cloud storage services [PDF]

open access: yes, 2013
Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities.
Glisson, W., Grispos, G., Storer, T.
core   +2 more sources

FF-BTP Model for Novel Sound-Based Community Emotion Detection

open access: yesIEEE Access, 2023
Most emotion classification schemes to date have concentrated on individual inputs rather than crowd-level signals. In addressing this gap, we introduce Sound-based Community Emotion Recognition (SCED) as a fresh challenge in the machine learning domain.
Arif Metehan Yildiz   +8 more
doaj   +1 more source

Aspects of Digital Forensics in South Africa [PDF]

open access: yes, 2016
This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics.
Irons, Alastair, Ophoff, Jacques
core   +2 more sources

Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment

open access: yesEAI Endorsed Transactions on Creative Technologies, 2022
Digital forensics deals with digital evidence. Digital forensics is the study of data detection, acquisition, processing, analysis, and reporting. Encouraging the use of digital forensics in law enforcement investigations.
Muhammad Shoaib Akhtar, Tao Feng
doaj   +1 more source

Determining the effective number and surfaces of teeth for forensic dental identification through the 3D point cloud data analysis

open access: yesEgyptian Journal of Forensic Sciences, 2020
Background The assimilation between three-dimensional (3D) imaging techniques and dental forensic science can provide rich and stable information for human identification.
Arofi Kurniawan   +6 more
doaj   +1 more source

Voice Activity Detection Optimized by Adaptive Attention Span Transformer

open access: yesIEEE Access, 2023
Voice Activity Detection (VAD) is a widely used technique for separating vocal regions from audio signals, with applications in voice language coding, noise reduction, and other domains.
Wenpeng Mu, Bingshan Liu
doaj   +1 more source

Digital forensics formats: seeking a digital preservation storage format for web archiving [PDF]

open access: yes, 2011
In this paper we discuss archival storage formats from the point of view of digital curation and preservation. Considering established approaches to data management as our jumping off point, we selected seven format attributes which are core to the ...
Kim, Y., Ross, S.
core   +4 more sources

Mobile forensic triage for damaged phones using M_Triage [PDF]

open access: yes, 2016
Mobile forensics triage is a useful technique in a digital forensics investigation for recovering lost or purposely deleted and hidden files from digital storage.
Mohammed Hasheem, Yusoof
core   +1 more source

Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking

open access: yesIEEE Access, 2023
The class imbalance problem negatively impacts learning algorithms’ performance in minority classes which may constitute more severe attacks than the majority ones.
Seyed Mohammad Hadi Mirsadeghi   +3 more
doaj   +1 more source

Towards a Formalization of Digital Forensics [PDF]

open access: yes, 2009
While some individuals have referred to digital forensics as an art, the literature of the discipline suggests a trend toward the formalization of digital forensics as a forensic science. Questions about the quality of digital evidence and forensic soundness continue to be raised by researchers and practitioners in order to ensure the trustworthiness ...
Jill Slay   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy