Výsledky vyhledávání - Computer Forensic Methods

Upřesnit hledání
  1. 1

    A computer forensic method for detecting timestamp forgery in NTFS Autor Cho, Gyu-Sang

    ISSN: 0167-4048, 1872-6208
    Vydáno: Amsterdam Elsevier Ltd 01.05.2013
    Vydáno v Computers & security (01.05.2013)
    “…In this paper, we present a computer forensic method for detecting timestamp forgeries in the Windows NTFS file system…”
    Získat plný text
    Journal Article
  2. 2

    Development of a Computer-Assisted Forensic Radiographic Identification Method Using the Lateral Cervical and Lumbar Spine Autor Derrick, Sharon M., Raxter, Michelle H., Hipp, John A., Goel, Priya, Chan, Elaine F., Love, Jennifer C., Wiersema, Jason M., Akella, N. Shastry

    ISSN: 0022-1198, 1556-4029, 1556-4029
    Vydáno: United States Blackwell Publishing Ltd 01.01.2015
    Vydáno v Journal of forensic sciences (01.01.2015)
    “…Medical examiners and coroners (ME/C) in the United States hold statutory responsibility to identify deceased individuals who fall under their jurisdiction. The computer…”
    Získat plný text
    Journal Article
  3. 3

    EFFECTIVENESS OF THE METHOD OF FORENSIC COMPUTER SIMULATION OF OFFENCES IN THE CONTEXT OF MILITARY OPERATIONS Autor Akhtyrska, Nataliia, Kostiuchenko, Olena, Vynohradova, Anna, Pavlysh, Tetiana, Barhan, Serhii

    ISSN: 2175-0947
    Vydáno: Petropolis Catholic University of Petropolis 01.01.2024
    Vydáno v Lex humana (Petrópolis, RJ, Brasil) (01.01.2024)
    “… This requires improved and innovative response to offences and crimes, which include forensic computer simulation of offences…”
    Získat plný text
    Journal Article
  4. 4

    EFFECTIVENESS OF THE METHOD OF FORENSIC COMPUTER SIMULATION OF OFFENCES IN THE CONTEXT OF MILITARY OPERATIONS /EFICÁCIA DO MÉTODO DE SIMULAÇÃO COMPUTADORIZADA FORENSE DE OFENSAS NO CONTEXTO DE OPERAÇÕES MILITARES Autor Akhtyrska, Nataliia, Kostiuchenko, Olena, Vynohradova, Anna, Pavlysh, Tetiana, Barhan, Serhii

    ISSN: 2175-0947, 2175-0947
    Vydáno: Catholic University of Petropolis (Universidade Catolica de Petropolis) 01.01.2024
    Vydáno v Lex humana (Petrópolis, RJ, Brasil) (01.01.2024)
    “… This requires improved and innovative response to offences and crimes, which include forensic computer simulation of offences…”
    Získat plný text
    Journal Article
  5. 5

    On statistical analysis of forensic DNA: Theory, methods and computer programs Autor Fung, Wing K., Hu, Yue-Qing, Chung, Yuk-Ka

    ISSN: 0379-0738, 1872-6283
    Vydáno: Kidlington Elsevier Ireland Ltd 16.10.2006
    Vydáno v Forensic science international (16.10.2006)
    “… In this paper, general statistical principles for forensic DNA analysis are presented. We introduce the theory and methods for the statistical assessment in kinship determination and DNA mixture evaluation…”
    Získat plný text
    Journal Article Konferenční příspěvek
  6. 6

    Password Cracking Methods and Techniques in Computer Forensic Investigation Autor İlker Kara

    ISSN: 2602-3563
    Vydáno: Istanbul University Press 01.06.2021
    Vydáno v Acta infologica (01.06.2021)
    “… This situation creates large obstacles forto the investigation of computer systems and files which are the subject of forensic events, especially…”
    Získat plný text
    Journal Article
  7. 7
  8. 8

    Simple Methods for Improving the Forensic Classification between Computer-Graphics Images and Natural Images Autor Yacine Bouhamidi, Kai Wang

    ISSN: 2673-6756
    Vydáno: MDPI AG 14.03.2024
    “… It is challenging to achieve good classification performance when the forensic classifier is tested on computer-graphics images generated by unknown rendering engines and when we…”
    Získat plný text
    Journal Article
  9. 9
  10. 10

    Analysis of the Effective Turning-Off Methods for Computer Forensics Autor Naufal, Muhammad, Cahyani, Niken Dwi Wahyu, Jadied, Erwid Musthofa

    Vydáno: IEEE 07.08.2024
    “…The decision between forced shutdown and normal shutdown is crucial regarding memory artifact recovery in computer forensics…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method Autor Umar, Rusydi, Riadi, Imam, Kusuma, Ridho Surya

    ISSN: 2252-7834, 2549-7448
    Vydáno: State Islamic University Sunan Kalijaga 30.06.2021
    “… Attacks become a severe threat and damage the system, namely by encrypting data on the victim's computer, spreading it to other computers on the same computer network, and demanding a ransom…”
    Získat plný text
    Journal Article
  12. 12

    The keyword search method and its importance in computer forensics Adli bilişimde anahtar kelime araması metodu ve önemi Autor Çakır, Huseyin, Kılıç, Mehmet Serkan

    ISSN: 1303-5134, 1303-5134
    Vydáno: 26.04.2016
    “… Similar to using search engines on internet investigations, using keyword search method of computer forensics investigations has too much benefits…”
    Získat plný text
    Journal Article
  13. 13

    Computer Forensics Method in Analysis of Files Timestamps in Microsoft Windows Operating System and NTFS File System Autor Vesta Sergeevna Matveeva, Alexander Vladimirovich Mamaev

    ISSN: 2074-7128, 2074-7136
    Vydáno: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.02.2013
    “… The authors suggest a method of revealing original timestamps after replacement and automated variant of it in case of a set of files…”
    Získat plný text
    Journal Article
  14. 14
  15. 15

    Development of a systematic computer vision-based method to analyse and compare images of false identity documents for forensic intelligence purposes–Part I: Acquisition, calibration and validation issues Autor Auberson, Marie, Baechler, Simon, Zasso, Michaël, Genessay, Thibault, Patiny, Luc, Esseiva, Pierre

    ISSN: 0379-0738, 1872-6283, 1872-6283
    Vydáno: Ireland Elsevier B.V 01.03.2016
    Vydáno v Forensic science international (01.03.2016)
    “… forensic intelligence efforts. Inspired by previous research work about digital images of Ecstasy tablets, a systematic and complete method…”
    Získat plný text
    Journal Article
  16. 16

    Сlassification of methods of production of computer forensic by usage approach of graph theory Autor Anna Ravilyevna Smolina, Alexander Alexandrovich Shelupanov

    ISSN: 2074-7128, 2074-7136
    Vydáno: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.06.2016
    “…Сlassification of methods of production of computer forensic by usage approach of graph theory is proposed…”
    Získat plný text
    Journal Article
  17. 17

    An Intuitive Computer Forensic Method by Timestamp Changing Patterns Autor Gyu-Sang Cho

    Vydáno: IEEE 01.07.2014
    “…This proposes an intuitive computer forensic method by timestamp changing patterns of operations on file in Windows NTFS file system…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    Computer–based method of bite mark analysis: A benchmark in forensic dentistry? Autor Pallam, NanditaKottieth, Boaz, Karen, Natrajan, Srikant, Raj, Minu, Manaktala, Nidhi, Lewis, AmithaJ

    ISSN: 0975-1475, 0975-2137
    Vydáno: India Medknow Publications & Media Pvt. Ltd 2016
    “… impression method, and xerographic method. These were compared with the original overlay produced digitally…”
    Získat plný text
    Journal Article
  19. 19

    Reviewing Image Data: Detecting Forgery Using a Robust Forensic Method Autor Mishra, Manuj, Jain, Neelesh Kumar, Kumar, Ajay

    ISSN: 2661-8907, 2662-995X, 2661-8907
    Vydáno: Singapore Springer Nature Singapore 08.11.2023
    Vydáno v SN computer science (08.11.2023)
    “…Over the past two decades, the Internet or web components, simply becoming acquainted with modern digital technology, have made the world more connected than…”
    Získat plný text
    Journal Article
  20. 20

    Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Autor Oettinger, William

    ISBN: 9781803239071, 1803239077
    Vydáno: Packt Publishing 2022
    “…Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected Key Features Investigate the core methods of computer…”
    Získat plný text
    E-kniha