-
21
Lightweight Photo-Response Non-Uniformity Fingerprint Extraction Algorithm Based on an Invertible Denoising Network
Published 2024-12-01“…The photo-response non-uniformity (PRNU) noise of imaging sensors significantly aids digital forensics and judicial identification, as it can be used as the fingerprint for uniquely identifying individual imaging devices. …”
Get full text
Article -
22
Robust Face Detection and Identification under Occlusion using MTCNN and RESNET50
Published 2025-01-01“…Technologies are similar to digital forensics in that they can recognize people by scanning faces. …”
Get full text
Article -
23
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
Published 2025-01-01Get full text
Article -
24
Quantum-Based Feature Selection for Multiclassification Problem in Complex Systems with Edge Computing
Published 2020-01-01Get full text
Article -
25
EFFECT OF E-GOVERNANCE POLICY ON SECURITY IN NIGERIA
Published 2024-10-01“…The study concludes that if the Nigerian government focuses on providing digital incidence reporting systems, digital forensic tools, and CCTV surveillance systems, it will lead to an improved security situation in the country. …”
Get full text
Article -
26
Investigation Methodology of a Virtual Desktop Infrastructure for IoT
Published 2015-01-01“…During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.…”
Get full text
Article -
27
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
Get full text
Article -
28
Digital Safety for Women and Children: Legal and Policy Challenges Indonesia, Philippines, and Thailand
Published 2024-12-01“…The results reveal that while these countries have made significant progress through the establishment of legal frameworks, implementation remains hindered by limited technical capacity, a lack of digital forensic expertise, and low public digital literacy. …”
Get full text
Article