Results 11 to 20 of about 231,263 (347)

Study QoS Optimization and Energy Saving Techniques in Cloud, Fog, Edge, and IoT

open access: yesComplexity, 2020
With an increase of service users’ demands on high quality of services (QoS), more and more efficient service computing models are proposed. The development of cloud computing, fog computing, and edge computing brings a number of challenges, e.g., QoS ...
Zhiguo Qu   +4 more
doaj   +1 more source

A Case-Based Reasoning Method for Locating Evidence During Digital Forensic Device Triage [PDF]

open access: yes, 2014
The role of triage in digital forensics is disputed, with some practitioners questioning its reliability for identifying evidential data. Although successfully implemented in the field of medicine, triage has not established itself to the same degree in ...
Horsman, Graeme   +2 more
core   +1 more source

Snap Forensics: A Tradeoff between Ephemeral Intelligence and Persistent Evidence Collection [PDF]

open access: yes, 2017
Digital evidence needs to be made persistent so that it can be used later. For citizen forensics, sometimes intelligence cannot or should not be made persistent forever.
Tun, Thein, Yu, Yijun
core   +1 more source

TASPERT: Target-Specific Reverse Transcript Pools to Improve HTS Plant Virus Diagnostics

open access: yesViruses, 2021
High-throughput sequencing (HTS) is becoming the new norm of diagnostics in plant quarantine settings. HTS can be used to detect, in theory, all pathogens present in any given sample.
Andres S. Espindola   +5 more
doaj   +1 more source

Cryptographic Techniques for Data Privacy in Digital Forensics

open access: yesIEEE Access, 2023
The acquisition and analysis of data in digital forensics raise different data privacy challenges. Many existing works on digital forensic readiness discuss what information should be stored and how to collect relevant data to facilitate investigations ...
Taiwo Blessing Ogunseyi   +1 more
doaj   +1 more source

Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime [PDF]

open access: yesJournal of Information Technology Management, 2023
The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court ...
Serhii Drobotov   +5 more
doaj   +1 more source

FORENSIC MEDICINE [PDF]

open access: yesThe American Journal of the Medical Sciences, 1950
Mode of access: Internet.
openaire   +1 more source

Application Prospect of Integrative Omics in Forensic Identification of Methamphetamine-Associated Psychosis

open access: yesFayixue Zazhi, 2022
The clinical symptoms and signs of methamphetamine-associated psychosis (MAP) and schizophrenia are highly similar, but the situation is completely different when MAP and schizophrenia patients need to be assessed for criminal responsibility after they ...
ZHAO Long-rui   +5 more
doaj   +1 more source

A metamodel for mobile forensics investigation domain. [PDF]

open access: yesPLoS ONE, 2017
With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain ...
Abdulalem Ali   +4 more
doaj   +1 more source

K-FFRaaS: A Generic Model for Financial Forensic Readiness as a Service in Korea

open access: yesIEEE Access, 2021
While Korean financial companies are currently providing electronic financial services by establishing the high-level information technology and security system in accordance with the Electronic Financial Supervision Regulations (EFSR), they are rarely ...
Sung Jin Lee, Gi Bum Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy