Results 31 to 40 of about 106,068 (200)

Video-Based Evidence Analysis and Extraction in Digital Forensic Investigation

open access: yesIEEE Access, 2019
As a result of the popularity of smart mobile devices and the low cost of surveillance systems, visual data are increasingly being used in digital forensic investigation.
Jianyu Xiao, Shancang Li, Qingliang Xu
doaj   +1 more source

The Internet of Things (IoT) Forensic Investigation Process

open access: yesJournal of Information Security and Cybercrimes Research, 2023
The Internet of Things (IoT), a rapidly evolving network of connected devices, is expected to grow to an astounding 41.6 billion units by 2025. This exponential growth, while beneficial in terms of data collection and exchange, has also increased the ...
Mariam Al-Shaer   +2 more
doaj   +1 more source

Using smartphones as a proxy for forensic evidence contained in cloud storage services [PDF]

open access: yes, 2013
Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities.
Glisson, W., Grispos, G., Storer, T.
core   +2 more sources

A Review Of Forensic Analysis Techniques For Android Phones

open access: yesJISR on Computing, 2017
Mobile forensics analysis is the sub-domain of digital forensics, which addresses solving the minor technology misuse cases to substantial international digital crime cases. Mobile forensic refers to the acquisition of data and analysis of the artifacts
Murtaza Ahmed, M.N.A. Khan
doaj   +1 more source

Using a Goal-Driven Approach in the Investigation of a Questioned Contract [PDF]

open access: yes, 2013
Part 3: FORENSIC TECHNIQUESInternational audienceThis paper presents a systematic process for describing digital forensic investigations. It focuses on forensic goals and anti-forensic obstacles and their operationalization in terms of human and software
Aziz, Benjamin, Blackwell, C., Islam, S.
core   +3 more sources

Strategies for protecting intellectual property when using CUDA applications on graphics processing units [PDF]

open access: yes, 2016
Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to
Cheng J.   +7 more
core   +3 more sources

Scholarly Discourse of Remote Forensic Auditing and Fraud Schemes in Remote Workforce: A Scoping Review

open access: yesInternational Journal of Applied Research in Business and Management
Practical and empirical question dominating the discussion is whether or not the remote forensic auditing techniques and capabilities in detection of fraud schemes in remote workforce.
Jean Damascene Mvunabandi
doaj   +1 more source

Forensic anthropology and molecular biology: independent or Forensic anthropology and molecular biology: independent or complementary sciences in forensic dentistry? An overview

open access: yesBrazilian Journal of Oral Sciences, 2016
Human identification is currently one of the most outstanding areas of Forensic Sciences. Forensic anthropology is a branch of the Forensic Sciences concerned with the application of general anthropological knowledge and methods to the process of law ...
Ricardo Henrique Alves da Silva   +1 more
doaj   +1 more source

A Comprehensive Framework for Dark Web Forensic Tools

open access: yesJournal of Information Security and Cybercrimes Research
The Dark Web is a hidden part of the internet that has become prominent in cybercriminal activities. This necessitates the development of innovative forensic tools and methodologies to handle the unique challenges posed by the Dark Web.
Keshav Kaushik, Priyanka Gaur
doaj   +1 more source

Observations from Canadian practitioners about the investigation and prosecution of crimes involving child and adult witnesses [PDF]

open access: yes, 2015
Hundreds of scientific studies on the competencies and limitations of eyewitnesses have been published, but few have sought input from front-line forensic interviewers.
Cameron, Sean Curtis, Roberts, Kim P.
core   +3 more sources

Home - About - Disclaimer - Privacy