X Du, C Hargreaves, J Sheppard, F Anda… - Proceedings of the 15th …, 2020 - dl.acm.org
Multi-year digital forensic backlogs have become commonplace in law enforcement agencies throughout the globe. Digital forensic investigators are overloaded with the volume …
This paper targets two main goals. First, we want to provide an overview of available datasets that can be used by researchers and where to find them. Second, we want to stress …
For those investigating cases of Child Sexual Abuse Material (CSAM), there is the potential harm of experiencing trauma after illicit content exposure over a period of time. Research …
E Oriwoh, P Sant - 2013 IEEE 10th International Conference on …, 2013 - ieeexplore.ieee.org
This paper describes the design of the Forensics Edge Management System (FEMS), a system that autonomously provides security and forensic services within the home Internet of …
Development and exploitation of technology have led to the further expansion and complexity of digital crimes. On the other hand, the growing volume of data and …
S Wu - Information Systems and e-Business Management, 2020 - Springer
In the current university teaching environment, digital media technology has been widely used in the teaching platform to better serve the course teaching. In this paper, the …
The vitrification of high-level nuclear waste within borosilicate glass and its disposition within a multi-barrier repository deep underground is accepted as the best form of disposal. Here …
S Soltani, SAH Seno - 2017 7th International Conference on …, 2017 - ieeexplore.ieee.org
The growth of digital technologies results in the growth of digital crimes. Digital forensics aims to collect crime-related evidence from various digital media and analyze it. This survey …
With the emergence of Android as a leading operating system in mobile devices, it becomes mandatory to develop specialized, predictive and robust security measures to provide a …