Results 71 to 80 of about 106,068 (200)

EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution

open access: yes, 2017
Education and training in digital forensics requires a variety of suitable challenge corpora containing realistic features including regular wear-and-tear, background noise, and the actual digital traces to be discovered during investigation.
Du, Xiaoyu, Lillis, David, Scanlon, Mark
core   +1 more source

Technology in Forensic Sciences: Innovation and Precision

open access: yesTechnologies
The advancement of technology and its developments have provided the forensic sciences with many cutting-edge tools, devices, and applications, allowing forensics a better and more accurate understanding of the crime scene, a better and optimal ...
Xavier Chango   +3 more
doaj   +1 more source

Enhancing Traditional Reactive Digital Forensics to a Proactive Digital Forensics Standard Operating Procedure (P-DEFSOP): A Case Study of DEFSOP and ISO 27035

open access: yesApplied Sciences
With the growing intensity of global cybersecurity threats and the rapid advancement of attack techniques, strengthening enterprise information and communication technology (ICT) infrastructures and enhancing digital forensics have become critical ...
Hung-Cheng Yang   +2 more
doaj   +1 more source

Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]

open access: yes, 2016
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core  

Security analysis of cyber physical system using digital forensic incident response

open access: yesCyber Security and Applications
There is a great demand for an efficient security tool which can secure IIoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IIoT considering the closed, dynamic and distributed architecture.
Pranita Binnar, Sunil Bhirud, Faruk Kazi
doaj   +1 more source

Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction

open access: yesJournal of Digital Forensics, Security and Law, 2014
Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-forensic tools to make it difficult to find incriminating evidence and reconstruct attack scenarios that can stand up to the expected level of evidence ...
Changwei Liu   +2 more
doaj  

Hyphenated mass spectrometric techniques—indispensable tools in clinical and forensic toxicology and in doping control [PDF]

open access: yesJournal of Mass Spectrometry, 2006
AbstractHyphenated mass spectrometric techniques, particularly gas chromatography/mass spectrometry (GC/MS) and liquid chromatography/mass spectrometry (LC/MS), are indispensable tools in clinical and forensic toxicology and in doping control owing to their high sensitivity and specificity.
openaire   +2 more sources

Earnings Management and Its Implications [PDF]

open access: yes, 2007
In the wake of continuing, highly publicized financial frauds and failures, the accounting profession has placed renewed emphasis on issues related to earnings management and earnings quality.
Akers, Michael   +2 more
core   +1 more source

Geoforensic Methods for Detecting Clandestine Graves and Buried Forensic Objects in Criminal Investigations – A Review

open access: yesJournal of Forensic Science and Medicine
Geoforensic techniques are being deployed in searches for hidden objects to counteract the shortcomings of conventional blunderbuss methods. Processing of crime scenes during searches for clandestine graves and buried objects is often destructive. Manual
Vaishnavi Narreddy
doaj   +1 more source

A Forensically Sound Adversary Model for Mobile Devices

open access: yes, 2015
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and
Choo, Kim-Kwang Raymond   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy