Results 31 to 40 of about 106,068 (200)
Video-Based Evidence Analysis and Extraction in Digital Forensic Investigation
As a result of the popularity of smart mobile devices and the low cost of surveillance systems, visual data are increasingly being used in digital forensic investigation.
Jianyu Xiao, Shancang Li, Qingliang Xu
doaj +1 more source
The Internet of Things (IoT) Forensic Investigation Process
The Internet of Things (IoT), a rapidly evolving network of connected devices, is expected to grow to an astounding 41.6 billion units by 2025. This exponential growth, while beneficial in terms of data collection and exchange, has also increased the ...
Mariam Al-Shaer +2 more
doaj +1 more source
Using smartphones as a proxy for forensic evidence contained in cloud storage services [PDF]
Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities.
Glisson, W., Grispos, G., Storer, T.
core +2 more sources
A Review Of Forensic Analysis Techniques For Android Phones
Mobile forensics analysis is the sub-domain of digital forensics, which addresses solving the minor technology misuse cases to substantial international digital crime cases. Mobile forensic refers to the acquisition of data and analysis of the artifacts
Murtaza Ahmed, M.N.A. Khan
doaj +1 more source
Using a Goal-Driven Approach in the Investigation of a Questioned Contract [PDF]
Part 3: FORENSIC TECHNIQUESInternational audienceThis paper presents a systematic process for describing digital forensic investigations. It focuses on forensic goals and anti-forensic obstacles and their operationalization in terms of human and software
Aziz, Benjamin, Blackwell, C., Islam, S.
core +3 more sources
Strategies for protecting intellectual property when using CUDA applications on graphics processing units [PDF]
Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to
Cheng J. +7 more
core +3 more sources
Practical and empirical question dominating the discussion is whether or not the remote forensic auditing techniques and capabilities in detection of fraud schemes in remote workforce.
Jean Damascene Mvunabandi
doaj +1 more source
Human identification is currently one of the most outstanding areas of Forensic Sciences. Forensic anthropology is a branch of the Forensic Sciences concerned with the application of general anthropological knowledge and methods to the process of law ...
Ricardo Henrique Alves da Silva +1 more
doaj +1 more source
A Comprehensive Framework for Dark Web Forensic Tools
The Dark Web is a hidden part of the internet that has become prominent in cybercriminal activities. This necessitates the development of innovative forensic tools and methodologies to handle the unique challenges posed by the Dark Web.
Keshav Kaushik, Priyanka Gaur
doaj +1 more source
Observations from Canadian practitioners about the investigation and prosecution of crimes involving child and adult witnesses [PDF]
Hundreds of scientific studies on the competencies and limitations of eyewitnesses have been published, but few have sought input from front-line forensic interviewers.
Cameron, Sean Curtis, Roberts, Kim P.
core +3 more sources

