Results 121 to 130 of about 184,816 (361)
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases.
Debbabi, Mourad+2 more
core +1 more source
Relative Impact of Underreporting and Desistance on the Dark Figure of Sexual Recidivism
ABSTRACT Sexual recidivism rates based on arrests or convictions underestimate actual reoffending due to underreporting. A previous Monte Carlo simulation estimated actual recidivism rates under various reporting and conviction assumptions but did not account for desistance—the decreasing likelihood of reoffending over time.
Nicholas Scurich, Richard S. John
wiley +1 more source
Non‐traditional encryption methods: Moving toward electrochemical cryptography
Abstract Cybersecurity and encryption are critical in diverse applications from simple emails to high‐priority government secrets. It is best accomplished by an “unbreakable” cipher or one which is only decrypted by those with a matching cipher key to the initial encryption.
Giana Biddle+2 more
wiley +1 more source
StegoAppDB: a Steganography Apps Forensics Image Database [PDF]
In this paper, we present a new reference dataset simulating digital evidence for image steganography. Steganography detection is a digital image forensic topic that is relatively unknown in practical forensics, although stego app use in the wild is on the rise.
arxiv
The polar [NH4]M(HCO2)3 frameworks exhibit dielectric relaxation due to orientational disorder of the NH4, as identified by a multi‐technique examination of their structure and dynamics. Comprehensive Summary Neutron diffraction studies of the low‐temperature relaxor ferroelectric phases of [NH4]M(HCO2)3, where M = Mn2+ and Zn2+, show that a third of ...
Thomas J. Hitchings+7 more
wiley +1 more source
Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph
We propose a mission‐centric approach to assessing the risks of cyber attacks on the organization's mission and provide decision support to network security administrators. Our approach uses a unique stochastic model that connects vulnerability impacts to the mission's security requirements and allows selecting the most resilient configuration of ...
Michal Javorník, Martin Husák
wiley +1 more source
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach
The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors ...
Choo, Kim-Kwang Raymond+2 more
core +1 more source
Determination of Boron Content in Surface Paintings From Historical Stained‐Glass Windows
The present work validates the use of LIBS as an analytical technique for in‐situ qualitative and quantitative determination of boron content in enamels and historical glass samples and provides information on in‐depth possible changes in the chemical composition induced by corrosion effects.
Laura Maestro‐Guijarro+6 more
wiley +1 more source
Abstract In the present study, we investigated the possibility of identifying the source oils of exposed fish using ratios of bicyclic sesquiterpane (bicyclane) chemical biomarkers. In the event of an oil spill, identification of source oil(s) for assessment, or for litigation purposes, typically uses diagnostic ratios of chemical biomarkers to produce
Francis D. Spilsbury+6 more
wiley +1 more source
Forensic engineering of advanced polymeric materials [PDF]
Open AccessPolymers are everywhere, also inside of the human body. Why polymers are so important? The most general answer is: because they are solid. With the term “polymer” we describe long chains consisted with repetitive structure, and longer chains ...
Kowalczuk, Marek
core