Showing 21 - 28 results of 28 for search '"digital forensics"', query time: 0.03s Refine Results
  1. 21

    Lightweight Photo-Response Non-Uniformity Fingerprint Extraction Algorithm Based on an Invertible Denoising Network by Zihang Yuan, Yanhui Xiao, Huawei Tian

    Published 2024-12-01
    “…The photo-response non-uniformity (PRNU) noise of imaging sensors significantly aids digital forensics and judicial identification, as it can be used as the fingerprint for uniquely identifying individual imaging devices. …”
    Get full text
    Article
  2. 22

    Robust Face Detection and Identification under Occlusion using MTCNN and RESNET50 by Eiman Wahab, Wajeeha Shafique, Habiba Amir, Sameena Javed, Muhammad Marouf

    Published 2025-01-01
    “…Technologies are similar to digital forensics in that they can recognize people by scanning faces. …”
    Get full text
    Article
  3. 23
  4. 24
  5. 25

    EFFECT OF E-GOVERNANCE POLICY ON SECURITY IN NIGERIA by Bashi B Musa, Abu Idris, Yusuf Abdulhakeem, Ndagi Salihu

    Published 2024-10-01
    “…The study concludes that if the Nigerian government focuses on providing digital incidence reporting systems, digital forensic tools, and CCTV surveillance systems, it will lead to an improved security situation in the country. …”
    Get full text
    Article
  6. 26

    Investigation Methodology of a Virtual Desktop Infrastructure for IoT by Doowon Jeong, Jungheum Park, Sangjin Lee, Chulhoon Kang

    Published 2015-01-01
    “…During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.…”
    Get full text
    Article
  7. 27

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  8. 28

    Digital Safety for Women and Children: Legal and Policy Challenges Indonesia, Philippines, and Thailand by Dwi Nur Fauziah Ahmad, Nucharee Nuchkoom Smith

    Published 2024-12-01
    “…The results reveal that while these countries have made significant progress through the establishment of legal frameworks, implementation remains hindered by limited technical capacity, a lack of digital forensic expertise, and low public digital literacy. …”
    Get full text
    Article