Results 131 to 140 of about 138,615 (167)
Some of the next articles are maybe not open access.
From the Case Files: Reconstructing a history of involuntary sterilisation
Disability & Society, 1998Although it is well-known that numerous jurisdictions in North America adopted legislation in the first half of the twentieth century allowing the involuntary sterilisation of persons diagnosed as 'mentally deficient', analysis of its implementation has rarely progressed beyond the examination of the legislation and the aggregate data presented in ...
Deborah C, Park, John P, Radford
openaire +2 more sources
FIT File Processing for Accident Reconstruction
SAE Technical Paper Series<div class="section abstract"><div class="htmlview paragraph">It is becoming increasingly common for bicyclists to record their rides using specialized bicycle computers and watches, the majority of which save the data they collect using the Flexible and Interoperable Data Transfer (.fit) Protocol.
David Sweet, Gerald Bretting
openaire +1 more source
Transmitted file extraction and reconstruction from network packets
2015 World Congress on Internet Security (WorldCIS), 2015When hackers try to attack a target system, their first goal is to install a malware to the target system. It is because hackers can do anything what they want if a malware is installed. In the past, most of the malwares were Microsoft PE files, however they have been changed to various file formats such as pdf, jpg, doc, jar and so on.
Yangseo Choi +4 more
openaire +1 more source
ReconBin: Reconstructing Binary File from Execution for Software Analysis
2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009Static analysis is one of the most popular approaches of software analysis. As more and more software protects their code by transformation or encryption, then releases them at runtime dynamically, it is hard to statically analyze these protected executables because of the failure of disassembling.
Lingyun Ying +5 more
openaire +1 more source
Autonomously Reconstructable Semi-Structured P2P Networks for File Sharing
Third International Conference on Autonomic and Autonomous Systems (ICAS'07), 2007We propose a semi-structured peer-to-peer (P2P) network for file sharing built from a structured P2P network as a basis for file search together with an unstructured P2P network for access load balancing. This semi-structured P2P network adopts a structured P2P network capable of providing reliable file search as its base structure.
Kei Ohnishi +3 more
openaire +1 more source
Lead-DBS reconstruction files for Nordenström et al. (2022)
2022Lead-DBS reconstruction files "ea_reconstruction.mat" for Nordenström et al. (2022), https://doi.org/10.3389/fnhum.2022.925283 . These include 24 subjects.
openaire +1 more source
3D breast cancer tissue reconstruction image files
2018Database of image files for AIMS Resource: 3D breast cancer tissue ...
openaire +1 more source
The Linux FAT32 allocator and file creation order reconstruction
Digital Investigation, 2014The allocation algorithm of the Linux FAT32 file system driver positions files on disk in such a way that their relative positions reveal information on the order in which these files have been created. This provides an opportunity to enrich information from (carved) file fragments with time information, even when such file fragments lack the file ...
openaire +1 more source
Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files
2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019Many forensic investigations include the analysis of log files. In a scenario of a single GNU/Linux server running Apache and Wordpress, we study which types of events can be inferred from log files and which ones not. Based on a formal definition of event reconstruction, we systematically compare which sources of logging information have which effect ...
Tobias Latzo, Felix Freiling
openaire +1 more source
Content Disarm and Reconstruction of RTF Files a Zero File Trust Methodology
IEEE Transactions on Information Forensics and Security, 2023openaire +1 more source

