Showing 221 - 240 results of 712 for search '"forensics"', query time: 0.04s Refine Results
  1. 221
  2. 222
  3. 223
  4. 224
  5. 225

    Perbandingan Tool Forensik Data Recovery Berbasis Android menggunakan Metode NIST by Imam Riadi, Sunardi Sunardi, Sahiruddin Sahiruddin

    Published 2020-02-01
    “…This research uses two smartphones as well as two Wondershare forensic tools from dr. Fone for Android and Oxygen Forensics Suite 2014, and use the NIST method which has a structured framework and forensic process that ensures investigators follow the steps of the research so that the results can be justified. …”
    Get full text
    Article
  6. 226
  7. 227
  8. 228
  9. 229
  10. 230
  11. 231

    Analisis Forensik Digital untuk Investigasi Kasus Cyberbullying pada Media Sosial Tiktok by Halimah Septya Mikayla, Ari Kusyanti, Primantara Hari Trisnawan

    Published 2024-10-01
    “…It involves the creation of case scenarios and the application of a digital forensic investigative model specifically focused on social networks. …”
    Get full text
    Article
  12. 232

    CFA-Based Splicing Forgery Localization Method via Statistical Analysis by Lei Liu, Peng Sun, Yubo Lang, Jingjiao Li

    Published 2024-01-01
    “…The color filter array of the camera is an effective fingerprint for digital forensics. Most previous color filter array (CFA)-based forgery localization methods perform under the assumption that the interpolation algorithm is linear. …”
    Get full text
    Article
  13. 233

    Implementation of lightweight intrusion detection model for security of smart green house and vertical farm by Jun-Ho Huh

    Published 2018-04-01
    “…Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
    Get full text
    Article
  14. 234

    Region Duplication Forgery Detection Technique Based on SURF and HAC by Parul Mishra, Nishchol Mishra, Sanjeev Sharma, Ravindra Patel

    Published 2013-01-01
    “…Region duplication forgery detection is a special type of forgery detection approach and widely used research topic under digital image forensics. In copy move forgery, a specific area is copied and then pasted into any other region of the image. …”
    Get full text
    Article
  15. 235

    A Solution to Reconstruct Cross-Cut Shredded Text Documents Based on Character Recognition and Genetic Algorithm by Hedong Xu, Jing Zheng, Ziwei Zhuang, Suohai Fan

    Published 2014-01-01
    “…This topic is relevant to the fields of forensics, investigative sciences, and archeology. …”
    Get full text
    Article
  16. 236

    Unknown presentation attack detection against rational attackers by Ali Khodabakhsh, Zahid Akhtar

    Published 2021-09-01
    “…Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. …”
    Get full text
    Article
  17. 237

    Revealing Traces of Image Resampling and Resampling Antiforensics by Anjie Peng, Yadong Wu, Xiangui Kang

    Published 2017-01-01
    “…Image resampling is a common manipulation in image processing. The forensics of resampling plays an important role in image tampering detection, steganography, and steganalysis. …”
    Get full text
    Article
  18. 238

    Starting with the Digital Doesn’t Make it Easier by Amanda Boczar

    Published 2025-01-01
    “…Unrealistic expectations of collection processing, retention, growth, and publication onto openly accessible platforms can quickly overwhelm a libraries’ digital collections’ team due to size, need for digital forensics work, copyright limitations, or other capacity-related issues. …”
    Get full text
    Article
  19. 239

    A dual-stream model based on PRNU and quaternion RGB for detecting fake faces. by Mohan Hua, Shuangliang Li, Jinwei Wang

    Published 2025-01-01
    “…The forensic examination of AIGC(Artificial Intelligence Generated Content) faces poses a contemporary challenge within the realm of color image forensics. …”
    Get full text
    Article
  20. 240

    Robust Face Detection and Identification under Occlusion using MTCNN and RESNET50 by Eiman Wahab, Wajeeha Shafique, Habiba Amir, Sameena Javed, Muhammad Marouf

    Published 2025-01-01
    “…Technologies are similar to digital forensics in that they can recognize people by scanning faces. …”
    Get full text
    Article