Results 51 to 60 of about 2,196,995 (204)

Timing Channel in IaaS: How to Identify and Investigate

open access: yesIEEE Access, 2019
Recently, the Infrastructure as a Service Cloud (IaaS) (e.g., Amazon EC2) has been widely used by many organizations. However, some IaaS security issues create serious threats to its users. A typical issue is the timing channel.
Xiao Fu   +4 more
doaj   +1 more source

Mediatization of Emotion on Social Media: Forms and Norms in Digital Mourning Practices [PDF]

open access: yes, 2018
This article provides the theoretical background for this Special Issue which explores the mediatization of emotion on social media as attested in different digital mourning practices. The overview discusses the affective and emotional turn alongside the
Ahmed S.   +7 more
core   +2 more sources

A Review of Mobile Forensic Investigation Process Models

open access: yesIEEE Access, 2020
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques.
Arafat Al-Dhaqm   +4 more
doaj   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Research Notes on the Emerging Concepts of Digital Heritage in Brazil [PDF]

open access: yes, 2010
This paper presents the first results in our investigation of the emerging Digital Heritage concepts in Brazil. It focuses on the analysis of a government experience with social media intended to prepare an official report on digital culture.
Dantas, Camila Guimaraes, Dodebei, Vera
core  

Multi-Stakeholder Case Prioritization in Digital Investigations

open access: yesJournal of Digital Forensics, Security and Law, 2014
This work examines the problem of case prioritization in digital investigations for better utilization of limited criminal investigation resources.
Joshua I. James
doaj  

Digital Twin-Based Investigation of a Building Collapse Accident

open access: yesAdvances in Civil Engineering, 2022
The collapse of engineering structures can cause significant casualties and have negative social effects. Collapse accident investigation can elucidate the potential causes and mechanisms of the collapse accident, thus remediating future structural ...
Zhe Zheng   +5 more
doaj   +1 more source

Rethinking live electronic music: a DJ perspective [PDF]

open access: yes, 2013
The author critiques the conventional understanding of live electronic music through empirical research on his own DJ practice and investigates others working in the field.
Vandemast-Bell, Paul
core   +2 more sources

Bluetooth Hacking: A Case Study

open access: yesJournal of Digital Forensics, Security and Law, 2009
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth ...
Dennis Browning, Gary C. Kessler
doaj  

Do digital investigators have to program? A controlled experiment in digital investigation

open access: yesDigital Investigation, 2017
We report on the results of an exploratory study in which graduate students played the role of digital investigators within an advanced digital forensics course. Overall, 39 students were split up into 10 groups. Each group had to solve one out of three arguably realistic cases within a time frame of 11 weeks.
Freiling, Felix, Zoubek, Christian
openaire   +1 more source

Home - About - Disclaimer - Privacy