Results 51 to 60 of about 66,758 (286)

Learnable Nonlocal Contrastive Network for Single Image Super-Resolution

open access: yesApplied Sciences, 2023
Single image super-resolution (SISR) aims to recover a high-resolution image from a single low-resolution image. In recent years, SISR methods based on deep convolutional neural networks have achieved remarkable success, and some methods further improve ...
Binbin Xu, Yuhui Zheng
doaj   +1 more source

Digital forensics in VoIP networks [PDF]

open access: yes2010 IEEE International Workshop on Information Forensics and Security, 2010
With VoIP being deployed on large scale, forensic analysis of captured VoIP traffic is of major practical interest. In this paper, we present a new fingerprinting approach that identifies the types of devices (name, version, brand, series) in captured VoIP traffic. We focus only on the signaling plane and discard voice related data.
François, Jérôme   +3 more
openaire   +2 more sources

Dark clouds on the horizon:the challenge of cloud forensics [PDF]

open access: yes, 2018
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian   +2 more
core   +1 more source

The use of Artificial Intelligence in digital forensics:An introduction [PDF]

open access: yes, 2010
Dr Faye Mitchell argues that the use of Artificial Intelligence, which is a well-established area of modern computer science that is capable of dealing with computationally large or complex problems, could be useful for digital forensics.
Mitchell, Faye
core   +1 more source

Dried blood spot analysis in antidoping: Technical challenges, analytical advances, and future perspectives

open access: yesBulletin of the Korean Chemical Society, EarlyView.
Dried blood spot (DBS) analysis enables minimally invasive blood collection with strong analyte stability and simplified logistics, supporting anti‐doping applications beyond traditional matrices. Recent advances address hematocrit, volume variability, and matrix effects while expanding coverage to steroid esters, World Anti‐Doping Agency‐listed ...
Jihyun Yoon   +4 more
wiley   +1 more source

An Efficient Boosting-Based Windows Malware Family Classification System Using Multi-Features Fusion

open access: yesApplied Sciences, 2023
In previous years, cybercriminals have utilized various strategies to evade identification, including obfuscation, confusion, and polymorphism technology, resulting in an exponential increase in the amount of malware that poses a serious threat to ...
Zhiguo Chen, Xuanyu Ren
doaj   +1 more source

A user-oriented network forensic analyser: the design of a high-level protocol analyser [PDF]

open access: yes, 2014
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g.
Clarke, Nathan   +3 more
core   +2 more sources

Anxiety and Aggression Among College Students With High‐Risk Adverse Childhood Experiences: The Role of Bullying Perpetration

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT This study examines the potential associations between anxiety and aggressive behaviors in college students with high‐risk adverse childhood experiences (ACEs) and explores how this relationship may be influenced by bullying perpetration, applying general strain theory. A sample of 282 college students aged 19 to 29 (Mage = 21.59, SDage = 2.48;
Jeoung Min Lee   +5 more
wiley   +1 more source

Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World

open access: yesIEEE Access
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee   +2 more
doaj   +1 more source

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications

open access: yesIEEE Access, 2018
Both Android application developers and malware authors use sophisticated obfuscation tools to prevent their mobile applications from being repackaged and analyzed.
Haehyun Cho   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy