Search Results - Application schema forensics
-
1
Database Application Schema Forensics
ISSN: 1015-7999, 2313-7835Published: Makhanda South African Institute of Computer Scientists and Information Technologists 15.12.2014Published in South African computer journal = Suid-Afrikaanse rekenaartydskrif (15.12.2014)“…The application schema layer of a Database Management System (DBMS) can be modified to deliver results that may warrant a forensic investigation…”
Get full text
Journal Article -
2
Database application schema forensics
ISSN: 1015-7999, 2313-7835Published: South African Computer Society (SAICSIT) 01.12.2014Published in South African computer journal = Suid-Afrikaanse rekenaartydskrif (01.12.2014)“…The application schema layer of a Database Management System (DBMS) can be modified to produce results that do not reflect the data actually stored in the database…”
Get full text
Journal Article -
3
Standardized Descriptive Method for the Anthropological Evaluation of Pediatric Skull Fractures
ISSN: 0022-1198, 1556-4029, 1556-4029Published: United States Blackwell Publishing Ltd 01.11.2014Published in Journal of forensic sciences (01.11.2014)“… For this reason, application of these schemas in the forensic anthropological interpretation of skull fractures is inappropriate…”
Get full text
Journal Article -
4
Emotional States Encountered by Law Enforcement Officers: an Initial Test of the Schema Mode Concept in Police Actions
ISSN: 0882-0783, 1936-6469Published: New York Springer US 01.09.2022Published in Journal of police and criminal psychology (01.09.2022)“…” Although the mode concept has been extensively validated in the field of forensic mental health, this is its first application to police work…”
Get full text
Journal Article -
5
Lost in translation? Psychometric properties and construct validity of the English Essen Climate Evaluation Schema (EssenCES) social climate questionnaire
ISSN: 1939-134X, 1939-134XPublished: United States 01.09.2012Published in Psychological assessment (01.09.2012)“…The social climate of correctional (forensic) settings is likely to have a significant impact on the outcome of treatment and the overall functioning of these units…”
Get more information
Journal Article -
6
AN INVESTIGATION OF SCHEMA DOMAINS PREDICTING ANGER FROM A PSYCHOTRAUMATOLOGICAL PERSPECTIVE
ISSN: 2651-4060Published: Istanbul University Press 01.02.2023Published in Sabiad (01.02.2023)“…Objective: Identifying the psychological traces of childhood traumas and learned negative life dynamics in adult life along with analyzing and treating mental trauma are important application areas of clinical forensic psychology…”
Get full text
Journal Article -
7
Laying foundations for effective machine learning in law enforcement. Majura – A labelling schema for child exploitation materials
ISSN: 1742-2876, 1873-202XPublished: Elsevier Ltd 01.09.2018Published in Digital investigation (01.09.2018)“…The health impacts of repeated exposure to distressing concepts such as child exploitation materials (CEM, aka ‘child pornography’) have become a major concern…”
Get full text
Journal Article -
8
Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools
Published: IEEE 01.06.2020Published in 2020 8th International Symposium on Digital Forensics and Security (ISDFS) (01.06.2020)“… Particularly, the iOS backup (obtained through a logical acquisition technique) is widely used by many forensic tools to sift through the data…”
Get full text
Conference Proceeding -
9
Psychodynamic art psychotherapy for the treatment of aggression in an individual with antisocial personality disorder in a secure forensic hospital: A single-case design study
ISSN: 1939-1536, 1939-1536Published: United States 01.06.2019Published in Psychotherapy (Chicago, Ill.) (01.06.2019)“…The aim of this single-case study was to investigate the responses to psychodynamic art psychotherapy from a man who had a diagnosis of antisocial personality…”
Get more information
Journal Article -
10
Improved Visual Secret Sharing Scheme for QR Code Applications
ISSN: 1556-6013, 1556-6021Published: IEEE 01.09.2018Published in IEEE transactions on information forensics and security (01.09.2018)“…Quick response (QR) codes have been widely used in applications, such as data storage and high-speed machine reading…”
Get full text
Journal Article -
11
A Predictive Classification Model for Identifying Conversation-related Mobile Forensic Data in Instant Messaging Applications
Published: IEEE 11.05.2023Published in 2023 11th International Symposium on Digital Forensics and Security (ISDFS) (11.05.2023)“…The rapidly changing and diverse landscape of instant messaging applications has significantly impacted the field of mobile forensics…”
Get full text
Conference Proceeding -
12
The process of processing: exploring the validity of Neisser's perceptual cycle model with accounts from critical decision-making in the cockpit
ISSN: 0014-0139, 1366-5847, 1366-5847Published: England Taylor & Francis 03.06.2015Published in Ergonomics (03.06.2015)“…The perceptual cycle model (PCM) has been widely applied in ergonomics research in domains including road, rail and aviation. The PCM assumes that information…”
Get full text
Journal Article -
13
Leveraging CybOX™ to standardize representation and exchange of digital forensic information
ISSN: 1742-2876, 1873-202XPublished: Kidlington Elsevier Ltd 01.03.2015Published in Digital investigation (01.03.2015)“… This work summarizes the strengths and weaknesses of existing schemas, and proposes the open-source CybOX schema as a foundation for storing and sharing digital forensic information…”
Get full text
Journal Article -
14
Our own worst enemy as protector of ourselves: stereotypes, schemas, and typifications as integral elements in the persuasive process
ISBN: 0761847049, 9780761847052, 0761847057, 9780761847045Published: Basingstoke University Press of America Press 2010“… of stereotypes, schemas, and typifications. Our internal packets of stored values and beliefs may constitute our own worst enemy as they militate against creative thought and forward-looking change…”
Get full text
eBook -
15
Directional Gaussian Model for Automatic Speeding Event Detection
ISSN: 1556-6013, 1556-6021Published: New York IEEE 01.10.2017Published in IEEE transactions on information forensics and security (01.10.2017)“… and feasible to use in real application. We have analyzed the theory that the velocity in the image plane varies due to the changes of the direction of the moving object with constant velocity in a real world plane…”
Get full text
Journal Article -
16
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records
ISSN: 1556-6013, 1556-6021Published: New York IEEE 01.01.2023Published in IEEE transactions on information forensics and security (01.01.2023)“… However, the direct applications of most existing SE schemes in cloud-assisted EHRs may result in challenges, for example in terms of functionality, security and efficiency…”
Get full text
Journal Article -
17
Implementation of a schema therapy awareness group for adult male low secure patients with comorbid personality difficulties: reflections and challenges
ISSN: 2050-8794, 2050-8808Published: Brighton Emerald Publishing Limited 22.04.2020Published in Journal of forensic practice (22.04.2020)“… Research supporting individual schema therapy (ST) as an effective intervention for personality disorder is growing steadily within a number of settings including with forensic patients…”
Get full text
Journal Article -
18
The importance of integrated therapies for personality disorder in forensic populations: attending to content and structure of delivery
ISSN: 2056-3841, 2056-385XPublished: Bingley Emerald Group Publishing Limited 08.06.2015Published in Journal of criminological research, policy and practice (Online) (08.06.2015)“…Purpose – The purpose of this paper is to provide some practice considerations for working with personality disorder, focusing on the application of assessment, formulation and therapy to complex populations…”
Get full text
Journal Article -
19
Multi-Spectral Palmprints joint Attack and Defense with Adversarial Examples Learning
ISSN: 1556-6013, 1556-6021Published: New York IEEE 01.01.2023Published in IEEE transactions on information forensics and security (01.01.2023)“… In addition, most of them are dependent on the explicit architecture or need time-consuming queries about the network to be attacked, which significantly limits their application in the field of security…”
Get full text
Journal Article -
20
Schema theory and practice : exploration and review of its use within female forensic mental health services
Published: ProQuest Dissertations & Theses 01.01.2014“… is based. The overall aim of this thesis was to explore the current application of this model and consider how appropriate and effective it is, with a particular emphasis being drawn to the female forensic population…”
Get full text
Dissertation

