Results 231 to 240 of about 1,722,189 (301)

Dataset of Windows operating system forensics artefacts. [PDF]

open access: yesData Brief
Marková E   +3 more
europepmc   +1 more source

Forensics-as-a-service: A Review of Mobile Forensics

2022 5th International Conference on Contemporary Computing and Informatics (IC3I), 2022
Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media. It is the most intricate step of the cybercrime investigation process often used as the evidence that can be presented in the court of law ...
Yogesh Kumar Sharma   +4 more
openaire   +2 more sources

Mobile Forensics: A Review

2020 International Conference on Computing and Information Technology (ICCIT-1441), 2020
Mobile devices are widely used. Although most of mobile devices are legally used, criminals may use mobile devices during crime commitment. Therefore, these mobile devices become important since the information stored in these devices can be used as a digital evidence which is an essential part of investigations conducted by mobile forensics ...
Hayam Alatawi   +5 more
openaire   +2 more sources

Mobile Forensics

Digital Forensic Education, 2019
Cole Troutman, Victor Mancha
semanticscholar   +4 more sources

◾ Mobile Forensics

Crime Science and Digital Forensics, 2015
Saurabh Kumar
openaire   +2 more sources

Perlustration on Mobile Forensics Tools

Computer Networks and Inventive Communication Technologies, 2022
Nowadays many people store more information in cellphones rather than do on their computer which leads to the increase of crimes taking place in mobile. This is also because of extensive use of mobile devices.
Utkarsh Shukla, Bishwas Mandal, K. Kiran
semanticscholar   +1 more source

Machine Learning-Based Speech Recognition of Chinese Dialects Method for Mobile Forensics

2021 13th International Conference on Communication Software and Networks (ICCSN), 2021
The software of QQ, WeChat and other voice chat tools become increasingly popular, people can use these methods to communicate expediently. In the meantime, criminals also employ these speech communication tools to engage in criminal activities.
Liwen Peng, Xiaolin Zhu, Peng Zhang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy