DIGITAL forensicsSTATISTICAL samplingThe objective of the study was to determine the characteristics and perspectives of the use of computer simulation as a method for investigating crimes committed in the course of an armed conflict. In addition, the study involved a system ap...
digital forensicsThe field of digital forensics requires a multidisciplinary understanding of a range of diverse subjects, but is interdisciplinary (in using principles, techniques and theories from other disciplines) encompassing both computer and forensic science. This requires that practitioners have a ...
A single malicious encroachment into a computer network can cause a great deal of damage to an organisation. Computer Security concerns the protection of information and property from misuse by unauthorized people. Computer forensics provides methods for the preservation, collection, validation, ...
China 716 TheApplicationofElectronicForensicsTechnologyinFoodSafetyTraceabilitySystem undertheEnvironmentofCloudComputing 1,2 JianWang, 1 ZhenminTangand 3 XianliJin 1 SchoolofComputerScienceandTechnology,NanjingUniversityofScienceandTechnology, Nanjing210094,China 2 JiangsuPostandTelecommunicationsPlanningandDesigning...
Computer forensics and cyber crime : an introduction Marjie T. Britz (Always learning) Pearson, c2013 3rd ed B Marjie - 《Pearson》 被引量: 6发表: 2013年 The Perception Analysis of Cyber Crimes in View of Computer Science Students Computer Technologies growing rapidly has become an indispensable...
Special Issue on “Applications of Machine Learning Techniques to Intrusion Detection and Digital Forensics” The security of computers and their networks is a major concern. As the computing devices become more pervasive and connected (such as from personal computer running a simple desktop application...
Of course, this may also impact the obfuscation techniques applied. To the best of our knowledge, Proguard (see Sec. 5) is still the major obfuscation tool utilized for the applications that are built on these platforms. 3. Android application forensics basics Due to the simplicity of ...
databases; computing in environmental forensics; and forensic engineering. Two large sections, each internally subdivided into nine units, conclude this chapter: “Individual Identification”, and “Bloodstain Pattern Analysis, and the Use of Software for Determining the Angle of Impact of Blood Drops...
DavidWatson,AndrewJones, inDigital Forensics Processing and Procedures, 2013 12.3.14.5.2Software Assets Software assets include: • application software: Application software implements business rules within theForensic Laboratory. Creation of application software is a time-consuming task; Integrity of appl...
16.The technology of data restores in the computer forensics collection application;数据恢复技术在计算机取证中的应用 17.Application of Computer Vision Technology in the Field of Logistics;计算机视觉技术在物流领域中的应用 18.The Application of Computer Forensic Technology for Investigation;计算机犯罪现场中...