Search

Your search keyword '"DIGITAL forensics"' showing total 7,878 results

Search Constraints

Start Over You searched for: Descriptor "DIGITAL forensics" Remove constraint Descriptor: "DIGITAL forensics"
7,878 results on '"DIGITAL forensics"'

Search Results

1. Approximate matching : definition and terminology

3. Study of Diverse Levels in Digital Forensics and IoT Forensics

5. Significance of image brightness levels for PRNU camera identification.

6. GAMEPLANS: A template for robust digital evidence strategy development.

7. A digital forensic analysis of an electrocardiogram medical device: A first look.

8. AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics.

9. A Comprehensive Survey on Methods for Image Integrity.

10. PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications.

11. Detection of IoT Malware using Network Forensics and Modeling.

12. 基于保密特征的数字音频双水印算法.

13. Advancing Forensic Science in Kazakhstan: The Emergence and Impact of Digital Forensics in Cybercrime Investigation.

14. Digital Forensics and Incident Response (DFIR): A Teaching Exercise.

15. Evidence Preservation in Digital Forensics: An Approach Using Blockchain and LSTM-Based Steganography.

16. SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics.

17. Open Source Tools for Digital Forensic Investigation: Capability, Reliability, Transparency and Legal Requirements.

18. Video and Audio Deepfake Datasets and Open Issues in Deepfake Technology: Being Ahead of the Curve.

19. Blockchain Forensics: A Systematic Literature Review of Techniques, Applications, Challenges, and Future Directions.

20. The Digital Footprints on the Run: A Forensic Examination of Android Running Workout Applications.

21. Experiences of Burnout, Post-Traumatic Growth, and Organisational Support in Police Officers Working in Specialised Units: An Interpretative Phenomenological Analysis.

22. Analysis of ransomware as a service using endpoint detection, response technology and mitigation techniques.

23. Comparative study on applications of cybersecurity tools for Kali Linux operating system.

24. Design thinking review for evidence handling in digital forensics process.

25. ENTERING THE MATRIX.

26. How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms.

27. ЦИФРОВА КРИМІНАЛІСТИКА В ЗАБЕЗПЕЧЕННІ ДІЯЛЬНОСТІ З ПРОТИДІЇ ЗЛОЧИННОСТІ

28. Unmasking the digital deception - a comprehensive survey on image forgery and detection techniques.

29. Online Vehicle Forensics Method of Responsible Party for Accidents Based on LSTM-BiDBN External Intrusion Detection.

30. Factors affecting forensic electric network frequency matching – A comprehensive study

31. Video and Audio Deepfake Datasets and Open Issues in Deepfake Technology: Being Ahead of the Curve

32. Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia

33. Mobile Device Forensics Framework: A Toolbox to Support and Enhance This Process

34. Copy–move forgery detection in digital image forensics: A survey.

35. IoT Forensics: Current Perspectives and Future Directions.

36. A survey on digital image forensic methods based on blind forgery detection.

37. Recurrent neural network and long short-term memory models for audio copy-move forgery detection: a comprehensive study.

38. Exploring Cybercrime Capabilities: Variations Among Cybercrime Investigative Units.

39. A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments.

40. Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems.

41. Plug and Play Device for In-Depth RAM Data Repository.

42. 基于网易云信IM框架的APK加解密取证方法.

43. Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods.

44. Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review.

45. A Comprehensive Literature Review on Volatile Memory Forensics.

46. Digital Forensic Based Object Recognition for Enhanced Crime Scene Interpretation.

47. Source Camera Identification Algorithm Based on Multi-Scale Feature Fusion.

48. 多维关联度分析驱动的数字证据链构造方法.

49. Digital Forensics in Google Drive: Techniques for Extracting and Analyzing Digital Artifacts.

50. SentinelFusion based machine learning comprehensive approach for enhanced computer forensics.

Catalog

Books, media, physical & digital resources