نتایج جستجو برای: forensics

تعداد نتایج: 3917  

Journal: :Journal of Clinical Microbiology 2016

2013
MARTIN S OLIVIER

Science provides the basis for truth claims in forensics. Very little research has been done to explore the scientific basis of digital forensics. The work that has been done vary widely in what they propose; in most cases it is unclear how the philosophical remarks about such forensic science apply to digital forensics practice, or that the practical suggestions are a sufficient basis to claim...

2007
Lodovico Marziale Golden G. Richard Vassil Roussev

The current generation of Graphics Processing Units (GPUs) contain a large number of general purpose processors, in sharp contrast to previous generation designs, where special-purpose hardware units (such as texture and vertex shaders) were commonly used. This fact, combined with the prevalence of multicore generalpurpose CPUs in modern workstations, suggests that performance-critical software...

2010
Hui-Wen Cheng Chung-Huang Yang

Computer management in campus had always been the core task for computer teachers. With the upgrades of computer equipment and network speed, the network traffic showed a higher pattern than before. However, the students’ perception of computer system safety and intellectual property right did not improve accordingly, which resulted in several information safety issues, and the Internet managin...

Journal: :JoWUA 2013
Rainer Poisel Erich Malzer Simon Tjoa

Cloud forensics refers to digital forensics investigations performed in cloud computing environments. Nowadays digital investigators face various technical, legal, and organizational challenges to keep up with current developments in the field of cloud computing. But, due to its dynamic nature, cloud computing also offers several opportunities to improve digital investigations in cloud environm...

2011
Hassina Bensefia Bachir El Ibrahimi

Computer Forensics applies law to fight against unlawful and illegitimate use of computers and networks. It employs investigation methods to solve computer crimes. Knowing that the firewall is the unique input and output in a network, it is considered as the ideal location for recording network activities. The firewall log files trace all incoming and outgoing events in a network. Its content c...

2016
Chet Hosmer Christopher Hyde

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive ...

2014
Swapnil G. Patil Mayank Bhatt

This paper crime scenes forensics and law enforcement is (latent fingerprint matching) techniques. In crime scenes and forensics Latent fingerprint identifying is an important latent fingerprint is poor quality image cannot easy to extract. It is matching latent fingerprint image it is necessary to extract features for efficient to improve the matching accuracy. The different latent matching al...

Journal: :Journal of Dentistry Indonesia 2013

Journal: :Vojnotehnicki glasnik 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید