Results 11 to 20 of about 106,068 (200)

Memory Based Anti-Forensic Tools and Techniques [PDF]

open access: yesInternational Journal of Information Security and Privacy, 2008
Computer forensics is the discipline that deals with the acquisition, investigation, preservation and presentation of digital evidence in the court of law. Whereas anti-forensics is the terminology used to describe malicious activities deployed to delete, alter or hide digital evidence with the main objective of manipulating, destroying and preventing ...
Hamid Jahankhani, Elidon Beqiri
openaire   +1 more source

Поняття техніко-криміналістичних засобів забезпечення протидії злочинам

open access: yesТеорія і практика правознавства, 2016
Розглянуто техніко-криміналістичні засоби як структурний елемент техніко- криміналістичного забезпечення протидії злочинам, запропоновано авторське визначення цієї криміналістичної категорії.
М. В. Капустіна
doaj   +1 more source

Fetal sex determination in light of interdisciplinary current studies: a forensic anthropological approach

open access: yesJournal of Contemporary Medicine, 2020
Aim: In this study, it was aimed to highlight the situation and importance of fetal sex determination in the context of forensic anthropology. Suggestions have been made about the development of this subject with current approaches and interdisciplinary ...
Özlem Mehder
doaj   +1 more source

D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

open access: yesJournal of Cybersecurity and Privacy, 2023
The use of the unindexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade.
Mohamed Chahine Ghanem   +4 more
doaj   +1 more source

OpenForensics:a digital forensics GPU pattern matching approach for the 21st century [PDF]

open access: yes, 2018
Pattern matching is a crucial component employed in many digital forensic (DF) analysis techniques, such as file-carving. The capacity of storage available on modern consumer devices has increased substantially in the past century, making pattern ...
Bayne, Ethan   +2 more
core   +2 more sources

A framework for the forensic investigation of unstructured email relationship data [PDF]

open access: yes, 2011
Our continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data.
Haggerty, J   +3 more
core   +1 more source

Sources of DNA contamination and decontamination procedures in the forensic laboratory [PDF]

open access: yes, 2011
The sensitivity of forensic DNA typing techniques can cause problems when evidence samples are inadvertently contaminated with DNA from another source. Therefore, precautions need to be taken to minimize the risk of contamination.
De Groote, Sabine   +6 more
core   +1 more source

Neuroprediction and A.I. in Forensic Psychiatry and Criminal Justice: A Neurolaw Perspective [PDF]

open access: yes, 2020
Advances in the use of neuroimaging in combination with A.I., and specifically the use of machine learning techniques, have led to the development of brain-reading technologies which, in the nearby future, could have many applications, such as lie ...
Bijlsma, J.   +4 more
core   +2 more sources

Memory Forensics: Tools and Techniques

open access: yesIndian Journal of Science and Technology, 2016
Objectives: To evaluate the performance of different tools that acquire, analyze and recover the evidences of crime from volatile memory. A comparison between different tools is presented with the aim of generating better understanding of the tools employed.
Shreshtha Gaur, Rita Chhikara
openaire   +1 more source

A comparison of forensic evidence recovery techniques for a windows mobile smart phone [PDF]

open access: yes, 2011
<p>Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult.
Glisson, W.B., Grispos, G., Storer, T.
core   +2 more sources

Home - About - Disclaimer - Privacy