Search

Showing total 20 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic computer forensics Remove constraint Topic: computer forensics Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
20 results

Search Results

1. Hacker Attacks on Electronic Election and Vote Counting Systems: Estimation of Damages and Methods of Protection.

2. Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments.

3. Recognition Model of Counterfeiting Digital Records of Biometric Photographic Image.

4. SentinelFusion based machine learning comprehensive approach for enhanced computer forensics.

5. Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments

6. Spurensicherung und Datenwiederherstellung - Forensische Methoden und Tools für Windows-basierte Systeme

7. Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges.

8. Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things.

9. Recognition Model of Counterfeiting Digital Records of Biometric Photographic Image

10. TO LICENSE OR NOT TO LICENSE REEXAMINED: AN UPDATED REPORT ON LICENSING OF DIGITAL EXAMINERS UNDER STATE PRIVATE INVESTIGATOR STATUTES.

11. A Comparative Analysis of Various Forensic Tools used in Secure Digital Transmission.

12. Steganalysis of the methods of concealing information in graphic containers

13. Researchers from Department of Computer Sciences and Information Technologies Provide Details of New Studies and Findings in the Area of Information Technology [Digital Forensics for the Socio-cyber World (Df-scw): a Novel Framework for Deepfake ...]

14. Research Results from Engineering Research Center of Digital Forensics Update Knowledge of Information and Data Tagging (A Self-Defense Copyright Protection Scheme for NFT Image Art Based on Information Embedding)

15. Reports from Maharshi Dayanand University Provide New Insights into Information and Data Encoding and Encryption (A Forensic Framework To Improve Digital Image Evidence Administration In Iiot)

18. Al-Balqa' Applied University Researcher Has Provided New Data on Cybernetics and Information Technology (A New Network Digital Forensics Approach for Internet of Things Environment Based on Binary Owl Optimizer)