Given the size and complexity of many digital forensic science device examinations, there is a need for practitioners to formally and strategically determine a course of conduct which …
N Zahadat - Journal of Digital Forensics, Security and Law, 2019 - commons.erau.edu
The purpose of the conducted study was to explore the credentialing of digital forensic investigators, drawing from applicable literature. A qualitative, descriptive research design …
Y Assabie, J Bigun - 2009 10th International Conference on …, 2009 - ieeexplore.ieee.org
Amharic is the official language of Ethiopia and uses Ethiopic script for writing. In this paper, we present writer-independent HMM-based Amharic word recognition for offline handwritten …
El texto está compuesto de ocho capítulos. Tras una introducción al tema ya las técnicas forenses, vistas desde la perspectiva de los tres roles descritos (intruso, administrador e …
Tujuan-Kajian ini dijalankan untuk mengukur kualiti garis panduan pembangunan media pengajaran berkonsepkan penceritaan digital (MPBPD). Kualiti diukur dengan …
SH Noureldin, S Hashem… - 2011 Third International …, 2011 - ieeexplore.ieee.org
This work present brief reports on the summarization of the application of the previously published comprehensive digital forensics process model and the forensic teams …
V Fernando, A Senarathne - 2022 International Wireless …, 2022 - ieeexplore.ieee.org
A massive 400% increase of cyber-attacks was reported in the Marine industry since February 2020 up to date. Experiments and research are being conducted towards …
Sažetak Ovaj završni rad prikazuje značajke forenzičke analize računala i mobilnih uređaja. Također, opisane su osnove računalne tehnologije i jedna od metodologija forenzičke …
N Utakrit, P Wuttidittachotti - International Journal of …, 2021 - inderscienceonline.com
This research aims to contribute to forensic counteractive measures that can identify and track the people who use e-mail for diploma mills. The authors had adopted e-mail forensic …