Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Network Forensics is a subtopic of Digital Forensics wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of... more
    • by  and +1
    •   3  
      Network ForensicsAnti ForensicsSQL injection attack
On April 4, 2017 a Syrian government air-attack at Khan Sheikhoun, Syria was followed by reports, photographs, and video data that indicated a significant number of casualties from exposure to toxic gases associated with the attack. This... more
    • by 
    •   4  
      Computational ForensicsCyber ForensicsAnti ForensicsLaw of Forensics and Scientific Evidence
A large number of image forensics methods are available which are capable of identifying image tampering. But these techniques are not capable of addressing the anti-forensics method which is able to hide the trace of image tampering. In... more
    • by 
    •   4  
      ForensicsAnti ForensicsJpeg CompressionBlocking Artifacts
    • by 
    •   3  
      Digital ForensicsImage compressionAnti Forensics
Technology concerning mobile devices has presented revolutionary growth during the last decade. Mobile phones do not serve only as a means of communication, but also as portable computers with advanced communication capabilities.... more
    • by 
    •   4  
      Computer ForensicsAndroidDigital ForensicsAnti Forensics
computer_Anti-forensics
    • by 
    •   11  
      Computer ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer securityComputer & Cyber forensics
This Document provide full details on blood spatter analysis. This document reveals information pertaining to the types of blood spatter which is a potential to be found at a crime scene which involved the spilling of blood. The reader of... more
    • by 
    •   21  
      Critical TheoryCriminologyCriminal LawCriminal Justice
The purpose of this study is to explore the evolving technology and systems to find a low cost, efficient and portable solution for hard disk drive forensic imaging.Hard Disk Drive Imaging is one of the most frequently used forensic... more
    • by 
    •   34  
      Computer SciencePolice ScienceForensicsCyberlaw
    • by 
    •   7  
      Computer ScienceStatisticsMachine LearningNetwork Forensics
    • by 
    • Anti Forensics
Studies towards image forensics are about a decade old and various forms of research techniques have been presented till date towards image forgery detection. Majority of the existing techniques deals with identification of tampered... more
    • by 
    •   6  
      Image ForensicAnti ForensicsImage ForgeryCopy-move Attack
Recent papers have urged the need for new forensic techniques and tools able to investigate anti-forensics methods, and have promoted automation of live investigation. Such techniques and tools are called proactive forensic approaches,... more
    • by 
    •   3  
      Computer ScienceSystematic Literature ReviewAnti Forensics
    • by 
    •   2  
      Anti ForensicsAnti-computer forensic
    • by 
    • Anti Forensics
This document engage some facts On Cannabis.Facts relative to the substance's Uses, Effects, Mechanisms of Action, and presumptive test for marijuana.
    • by 
    •   29  
      Critical TheoryPharmacologyCriminologyChemistry
    • by 
    •   2  
      SteganographyAnti Forensics
A trusted platform module (TPM) contains a unique identity and provides a range of security functions. This paper outlines a client-server system utilizing a TPM-enabled computer to hinder forensic examination. The system allows for data... more
    • by 
    •   5  
      Trusted ComputingTPMAnti ForensicsTrusted Platform Module
Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This... more
    • by  and +1
    •   22  
      Intellectual PropertyComputer ForensicsForensic SciencePrivacy
    • by 
    •   4  
      Image ProcessingDigital ForensicsAnti ForensicsImage forensics
A Trusted Platform Module (TPM) contains a unique identity and provides a range of security functions. This paper demonstrates a novel approach of using a TPM-enabled computer in a client-server system to hinder forensic examination. The... more
    • by 
    •   5  
      Trusted ComputingTPMAnti ForensicsTrusted Platform Module