Results 11 to 20 of about 231,263 (347)
Study QoS Optimization and Energy Saving Techniques in Cloud, Fog, Edge, and IoT
With an increase of service users’ demands on high quality of services (QoS), more and more efficient service computing models are proposed. The development of cloud computing, fog computing, and edge computing brings a number of challenges, e.g., QoS ...
Zhiguo Qu +4 more
doaj +1 more source
A Case-Based Reasoning Method for Locating Evidence During Digital Forensic Device Triage [PDF]
The role of triage in digital forensics is disputed, with some practitioners questioning its reliability for identifying evidential data. Although successfully implemented in the field of medicine, triage has not established itself to the same degree in ...
Horsman, Graeme +2 more
core +1 more source
Snap Forensics: A Tradeoff between Ephemeral Intelligence and Persistent Evidence Collection [PDF]
Digital evidence needs to be made persistent so that it can be used later. For citizen forensics, sometimes intelligence cannot or should not be made persistent forever.
Tun, Thein, Yu, Yijun
core +1 more source
TASPERT: Target-Specific Reverse Transcript Pools to Improve HTS Plant Virus Diagnostics
High-throughput sequencing (HTS) is becoming the new norm of diagnostics in plant quarantine settings. HTS can be used to detect, in theory, all pathogens present in any given sample.
Andres S. Espindola +5 more
doaj +1 more source
Cryptographic Techniques for Data Privacy in Digital Forensics
The acquisition and analysis of data in digital forensics raise different data privacy challenges. Many existing works on digital forensic readiness discuss what information should be stored and how to collect relevant data to facilitate investigations ...
Taiwo Blessing Ogunseyi +1 more
doaj +1 more source
Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime [PDF]
The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court ...
Serhii Drobotov +5 more
doaj +1 more source
The clinical symptoms and signs of methamphetamine-associated psychosis (MAP) and schizophrenia are highly similar, but the situation is completely different when MAP and schizophrenia patients need to be assessed for criminal responsibility after they ...
ZHAO Long-rui +5 more
doaj +1 more source
A metamodel for mobile forensics investigation domain. [PDF]
With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain ...
Abdulalem Ali +4 more
doaj +1 more source
K-FFRaaS: A Generic Model for Financial Forensic Readiness as a Service in Korea
While Korean financial companies are currently providing electronic financial services by establishing the high-level information technology and security system in accordance with the Electronic Financial Supervision Regulations (EFSR), they are rarely ...
Sung Jin Lee, Gi Bum Kim
doaj +1 more source

