OpenForensics:a digital forensics GPU pattern matching approach for the 21st century [PDF]
Pattern matching is a crucial component employed in many digital forensic (DF) analysis techniques, such as file-carving. The capacity of storage available on modern consumer devices has increased substantially in the past century, making pattern ...
Bayne, Ethan +2 more
core +2 more sources
Investigating visualisation techniques for rapid triage of digital forensic evidence [PDF]
This study investigates the feasibility of a tool that allows digital forensics (DF) investigators to efficiently triage device datasets during the collection phase of an investigation.
Bayne, Ethan, Hales, Gavin
core +2 more sources
Intent Arabic text categorisation based on different machine learning and term frequency
Abstract The complexity of Internet network configurations has made managing networks a complicated undertaking. Intent‐Based Networking (IBN) is a potential solution to this issue. In contrast to conventional networks, where a concrete description of the settings typically conveys a network administrator's goal kept on each device, an administrator's ...
Mohammad Fadhil Mahdi +1 more
wiley +1 more source
A comparison of forensic evidence recovery techniques for a windows mobile smart phone [PDF]
<p>Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult.
Glisson, W.B., Grispos, G., Storer, T.
core +2 more sources
Constrained Approximate Search Algorithms in Knowledge Discovery
Knowledge discovery in big data is one of the most important applications of computing machinery today. Search is essential part of all such procedures.
Slobodan Petrović, Julia Sidorova
doaj +1 more source
A user-oriented network forensic analyser: the design of a high-level protocol analyser [PDF]
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g.
Clarke, Nathan +3 more
core +2 more sources
Data restoration and file carving
This document proposes to make a contribution to the conceptualization and implementation of data recovery techniques through the abstraction of recovery methodologies and aspects that influence the process, relating human motivation to research needs, whether these are for the Auditing or computer science, allowing to generate classification of ...
Geovanni Ninahualpa Quina +3 more
openaire +2 more sources
A Game Theoretic Approach for Digital Forensic Tool Selection †
Digital forensic investigations are getting harder and more time consuming everyday because of various problems including rapid advances in technology, wide variety of available devices in investigations, and large amount of data to be analyzed. In order
Umit Karabiyik, Tugba Karabiyik
doaj +1 more source
On planet formation in HL Tau [PDF]
We explain the axisymmetric gaps seen in recent long-baseline observations of the HL Tau protoplanetary disc with the Atacama Large Millimetre/Submillimetre Array (ALMA) as being due to the different response of gas and dust to embedded planets in ...
Cerioli, Alice +5 more
core +2 more sources
Construction of scale models in industrial design: the irruption of additive manufacturing. Rubrics proposal for an objective evaluation [PDF]
Comunicació presentada a EDULEARN2019, 11th International Conference on Education and New Learning Technologies (July 1-3, 2019, Palma, Mallorca, Spain).Recent studies corroborate the progressive implementation of Additive Manufacturing technologies ...
Felip, Francisco, Gual, Jaume
core +1 more source

