Results 231 to 240 of about 1,722,189 (301)
Dataset of Windows operating system forensics artefacts. [PDF]
Marková E +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Forensics-as-a-service: A Review of Mobile Forensics
2022 5th International Conference on Contemporary Computing and Informatics (IC3I), 2022Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media. It is the most intricate step of the cybercrime investigation process often used as the evidence that can be presented in the court of law ...
Yogesh Kumar Sharma +4 more
openaire +2 more sources
2020 International Conference on Computing and Information Technology (ICCIT-1441), 2020
Mobile devices are widely used. Although most of mobile devices are legally used, criminals may use mobile devices during crime commitment. Therefore, these mobile devices become important since the information stored in these devices can be used as a digital evidence which is an essential part of investigations conducted by mobile forensics ...
Hayam Alatawi +5 more
openaire +2 more sources
Mobile devices are widely used. Although most of mobile devices are legally used, criminals may use mobile devices during crime commitment. Therefore, these mobile devices become important since the information stored in these devices can be used as a digital evidence which is an essential part of investigations conducted by mobile forensics ...
Hayam Alatawi +5 more
openaire +2 more sources
Perlustration on Mobile Forensics Tools
Computer Networks and Inventive Communication Technologies, 2022Nowadays many people store more information in cellphones rather than do on their computer which leads to the increase of crimes taking place in mobile. This is also because of extensive use of mobile devices.
Utkarsh Shukla, Bishwas Mandal, K. Kiran
semanticscholar +1 more source
Machine Learning-Based Speech Recognition of Chinese Dialects Method for Mobile Forensics
2021 13th International Conference on Communication Software and Networks (ICCSN), 2021The software of QQ, WeChat and other voice chat tools become increasingly popular, people can use these methods to communicate expediently. In the meantime, criminals also employ these speech communication tools to engage in criminal activities.
Liwen Peng, Xiaolin Zhu, Peng Zhang
semanticscholar +1 more source

