Results 51 to 60 of about 66,758 (286)
Learnable Nonlocal Contrastive Network for Single Image Super-Resolution
Single image super-resolution (SISR) aims to recover a high-resolution image from a single low-resolution image. In recent years, SISR methods based on deep convolutional neural networks have achieved remarkable success, and some methods further improve ...
Binbin Xu, Yuhui Zheng
doaj +1 more source
Digital forensics in VoIP networks [PDF]
With VoIP being deployed on large scale, forensic analysis of captured VoIP traffic is of major practical interest. In this paper, we present a new fingerprinting approach that identifies the types of devices (name, version, brand, series) in captured VoIP traffic. We focus only on the signaling plane and discard voice related data.
François, Jérôme +3 more
openaire +2 more sources
Dark clouds on the horizon:the challenge of cloud forensics [PDF]
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian +2 more
core +1 more source
The use of Artificial Intelligence in digital forensics:An introduction [PDF]
Dr Faye Mitchell argues that the use of Artificial Intelligence, which is a well-established area of modern computer science that is capable of dealing with computationally large or complex problems, could be useful for digital forensics.
Mitchell, Faye
core +1 more source
Dried blood spot (DBS) analysis enables minimally invasive blood collection with strong analyte stability and simplified logistics, supporting anti‐doping applications beyond traditional matrices. Recent advances address hematocrit, volume variability, and matrix effects while expanding coverage to steroid esters, World Anti‐Doping Agency‐listed ...
Jihyun Yoon +4 more
wiley +1 more source
An Efficient Boosting-Based Windows Malware Family Classification System Using Multi-Features Fusion
In previous years, cybercriminals have utilized various strategies to evade identification, including obfuscation, confusion, and polymorphism technology, resulting in an exponential increase in the amount of malware that poses a serious threat to ...
Zhiguo Chen, Xuanyu Ren
doaj +1 more source
A user-oriented network forensic analyser: the design of a high-level protocol analyser [PDF]
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g.
Clarke, Nathan +3 more
core +2 more sources
ABSTRACT This study examines the potential associations between anxiety and aggressive behaviors in college students with high‐risk adverse childhood experiences (ACEs) and explores how this relationship may be influenced by bullying perpetration, applying general strain theory. A sample of 282 college students aged 19 to 29 (Mage = 21.59, SDage = 2.48;
Jeoung Min Lee +5 more
wiley +1 more source
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee +2 more
doaj +1 more source
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications
Both Android application developers and malware authors use sophisticated obfuscation tools to prevent their mobile applications from being repackaged and analyzed.
Haehyun Cho +2 more
doaj +1 more source

