Results 31 to 40 of about 2,970,764 (321)

Digital forensics formats: seeking a digital preservation storage format for web archiving [PDF]

open access: yes, 2011
In this paper we discuss archival storage formats from the point of view of digital curation and preservation. Considering established approaches to data management as our jumping off point, we selected seven format attributes which are core to the ...
Kim, Y., Ross, S.
core   +4 more sources

Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment

open access: yesEAI Endorsed Transactions on Creative Technologies, 2022
Digital forensics deals with digital evidence. Digital forensics is the study of data detection, acquisition, processing, analysis, and reporting. Encouraging the use of digital forensics in law enforcement investigations.
Muhammad Shoaib Akhtar, Tao Feng
doaj   +1 more source

Determining the effective number and surfaces of teeth for forensic dental identification through the 3D point cloud data analysis

open access: yesEgyptian Journal of Forensic Sciences, 2020
Background The assimilation between three-dimensional (3D) imaging techniques and dental forensic science can provide rich and stable information for human identification.
Arofi Kurniawan   +6 more
doaj   +1 more source

The Application of Blockchain Technology in the Field of Digital Forensics: A Literature Review

open access: yesBlockchains
Blockchain technology has risen in recent years from its initial application in finance to gain prominence across diverse sectors, including digital forensics.
Oshoke Samson Igonor   +2 more
semanticscholar   +1 more source

Aspects of Digital Forensics in South Africa [PDF]

open access: yes, 2016
This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics.
Irons, Alastair, Ophoff, Jacques
core   +2 more sources

Mobile forensic triage for damaged phones using M_Triage [PDF]

open access: yes, 2016
Mobile forensics triage is a useful technique in a digital forensics investigation for recovering lost or purposely deleted and hidden files from digital storage.
Mohammed Hasheem, Yusoof
core   +1 more source

An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing

open access: yesIEEE Access, 2020
With the rapid growth of the number of images, many content-based image retrieval methods have been extensively used in our daily life. In general, image retrieval services are very expensive in terms of computing and storage.
Hua Wang   +3 more
doaj   +1 more source

Voice Activity Detection Optimized by Adaptive Attention Span Transformer

open access: yesIEEE Access, 2023
Voice Activity Detection (VAD) is a widely used technique for separating vocal regions from audio signals, with applications in voice language coding, noise reduction, and other domains.
Wenpeng Mu, Bingshan Liu
doaj   +1 more source

Cybercrime and the Law: Addressing the Challenges of Digital Forensics in Criminal Investigations

open access: yesMexican Law Review
A lack of standards and regulations for handling digital evidence is impeding its admissibility in court proceedings. This article addresses the challenges of digital forensics in criminal investigations due to the rise of cybercrime.
Naeem Allah Rakha
semanticscholar   +1 more source

Bitcoin forensics: a tutorial [PDF]

open access: yes, 2016
Over the past eighteen months, the digital cryptocurrency Bitcoin has experienced significant growth in terms of usage and adoption. It has also been predicted that if this growth continues then it will become an increasingly useful tool for various ...
Hara, Sukhvinder   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy