Academic literature on the topic 'Forensis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Forensis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Forensis"

1

Peisert, Sean, Matt Bishop, and Keith Marzullo. "Computer forensics in forensis." ACM SIGOPS Operating Systems Review 42, no. 3 (April 2008): 112–22. http://dx.doi.org/10.1145/1368506.1368521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kirn, Gal, and Niloufar Tajeri. "The Age of Forensics: Memory, Emancipatory Politics or Visual Strategy? Interview with Eyal Weizman and Anselm Franke." Maska 31, no. 177 (June 1, 2016): 14–35. http://dx.doi.org/10.1386/maska.31.177-178.14_7.

Full text
Abstract:
Eyal Weizman and Anselm Franke speak in detail about their collaborative effort and exhibition Forensis at HKW, Berlin. The interview by Nilourfar Tajeri and Gal Kirn tackled three major topics that emerged in the conferences during the exhibition: first, they spoke about the aesthetical implications of forensic realism and about the genesis of their collaborative work; secondly, they traced the relationship of forensics to emancipatory politics; and thirdly, they observed some theoretical and political underpinnings of the major shift from the age of the witness to the age of forensics, this connected to potential consequences for a different politics and culture of forensic memory.
APA, Harvard, Vancouver, ISO, and other styles
3

Mitas, Stergios. "Crimen publicum, poena forensis." Archiv fuer Rechts- und Sozialphilosophie 106, no. 4 (2020): 554. http://dx.doi.org/10.25162/arsp-2020-0027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Филяк, Петр Юрьевич, Сергей Владимирович Королев, and Никита Владимирович Тебеньков. "ENSURING THE INFORMATION SECURITY WITH THE USE OF TOOLS OF FORENSICS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 4(-) (December 15, 2021): 571–80. http://dx.doi.org/10.36622/vstu.2021.24.4.009.

Full text
Abstract:
Представлен подход к обеспечению информационной безопасности [1] с помощью применения инструментальных средств прикладной науки о расследовании и раскрытии преступлений, связанных с компьютерной безопасностью, известной под названием форензика . Рассматриваются кратко терминология, теоретические основы и подходы данной науки, а также представлен набор конкретных инструментов для реализации форензики в рамках программно-аппаратных комплексов, которые можно применять на практике в целях обеспечения информационной безопасности коммерческих и не коммерческих организаций, а также иных субъектов экономической деятельности. Представлены три программных продукта: OSForensics - комплект утилит для проведения компьютерной экспертизы, выполняющий поиск и анализ различных данных в системе, восстанавливающий данные, предоставляющий возможность просмотра следов активности пользователя; Belkasoft Evidence Center - инструмент для комплексной цифровой криминалистической экспертизы и расследования корпоративных инцидентов и Passware Kit Forensic - инструмент для поиска всех зашифрованных файлов на носителях информации. The paper presents an approach to ensuring information security through the use of tools of the applied science of investigation and disclosure of crimes related to computer security, known as forensics. The terminology, theoretical foundations and approaches of this science are briefly considered, as well as a set of specific tools for the implementation of forensis within the framework of software and hardware complexes that can be applied in practice in order to ensure information security of commercial and non-commercial organizations, as well as other subjects of economic activity. Three software products are presented: OSForensics - a set of utilities for conducting computer expertise, performing search and analysis of various data in the system, restoring data, providing the ability to view traces of user activity; Belkasoft Evidence Center - a tool for complex digital forensic examination and investigation of corporate incidents and Passware Kit Forensic -a tool for searching all encrypted files on data carriers.
APA, Harvard, Vancouver, ISO, and other styles
5

Apter, Emily. "Shibboleth: Policing by Ear and Forensic Listening in Projects by Lawrence Abu Hamdan." October 156 (May 2016): 100–115. http://dx.doi.org/10.1162/octo_a_00253.

Full text
Abstract:
Drawing on the work of Lawrence Abu Hamdan, a British-Lebanese artist and researcher currently based in Beirut, this essay examines the juridical and conceptual field of critical forensis which is situated at the juncture of security studies, art, and architecture. Abu Hamdan extends forensics to the area of “new audibilities,” with a focus on the politics of juridical hearing in situations of legal-identity profiling and voice authentication (the “shibboleth test”). Abu Hamdan's projects investigate how accent monitoring and audio surveillance, voice recognition, translation technologies, sovereign acts of listening, and court determinations of linguistic norms emerge as so many technical constraints on “freedom of speech,” itself a malleable term ascribed to discrepant claims and principles, yet taking on performative force in site-specific situations.
APA, Harvard, Vancouver, ISO, and other styles
6

Slipets, O. "THEORETICAL ASPECTS OF FORENSIS-PSYCHOLOGICAL EXAMINATION OF TYPOLOGICAL FEATURES OF PERSONALITY." Theory and Practice of Forensic Science and Criminalistics 20, no. 2 (December 4, 2019): 505–21. http://dx.doi.org/10.32353/khrife.2.2019.40.

Full text
Abstract:
Over more than a hundred years of history of the application of psychological knowledge to resolve issues of law remains a controversial series of theoretical provisions of forensic psychological examination. This is also true for the psychological examination of individual psychological (typological) features of the person. The purpose of the article is to formulate theoretical provisions of forensic psychological examination of typological features of a person, main concepts. Based on the definition of the object and subject of forensic psychological examination, the concept of object and subject of psychological examination of typological features of a person is formulated. On the basis of an analysis of the legal significance of the psychological study of a person of a suspect (accused) in criminal and administrative proceedings, the legal significance and tasks of forensic psychological examination of typological peculiarities are formulated. Proceeding from the subject of psychology, the legal significance of psychological facts for establishing legal criteria, the standardized requirements for qualification and the behavior of an expert, it is proposed to clarify the limits of competence of an expert psychologist. A means of applying the notion-limiter to general psychological categories, the definition of the basic concepts of forensic psychological examination typological features of the person. The theoretical provisions of the forensic psychological examination of psychological peculiarities of a person are formulated: object, subject, legal significance, tasks, limits of competence, thesaurus, is an element of the system of theoretical and methodical foundations of forensic psychological examination and the basis for the creation of a method of forensic psychological examination of typological features of a person .
APA, Harvard, Vancouver, ISO, and other styles
7

Rothwell, Gar W. "BOTRYOPTERIS FORENSIS (BOTRYOPTERIDACEAE), A TRUNK EPIPHYTE OF THE TREE FERN PSARONIUS." American Journal of Botany 78, no. 6 (June 1991): 782–88. http://dx.doi.org/10.1002/j.1537-2197.1991.tb14479.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mazo Gómez, Wilson De Jesús. "La tradición católica, su influencia en la conformación del rol de la mujer en la familia tradicional colombiana y su relación con la violencia de pareja al interior de ésta." Ratio Juris 14, no. 28 (October 17, 2019): 219–52. http://dx.doi.org/10.24142/raju.v14n28a8.

Full text
Abstract:
De acuerdo con el Instituto Nacional de Medicina Legal y Ciencias Forenses, en su informe Forensis 2017. Datos para la vida, los hechos de discriminación y violencia de pareja contra las mujeres en Colombia se han incrementado en los últimos años; esta situación podría catalogarse como producto de una sociedad que ha sido moldeada a partir del esquema machista y patriarcal que caracteriza a las sociedades que han estado influenciadas por tradiciones como la religión católica, que parecen justificar, en algunos de los relatos de sus textos sagrados, la condición de dominación que ejerce el hombre sobre la mujer. El Estado colombiano, que en sus inicios normativos se vio influenciado por esta tradición, ha buscado, a partir de la Constitución de 1991, y a través de su posterior normatividad, no solo la reivindicación de la mujer, sino la sanción a los agresores; sin embargo, estas medidas no han sido eficientes ya que no se ha podido garantizar un verdadero ambiente de seguridad y respeto por los derechos fundamentales de las mujeres. Por lo tanto, se hace necesario intervenir la configuración de la cultura colombiana, en aras de modificar las bases culturales sobre las cuales se construyó el imaginario social que perpetúa la estructura de dominación y discriminación contra la mujer.
APA, Harvard, Vancouver, ISO, and other styles
9

Mualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.

Full text
Abstract:
Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti dalam keadan aktif berdasarkan pedoman SNI 27037:2014 sesuai acuan kerangka kerja Common Phases of Computer Forensics Investigation Models untuk di implementasikan ke dalam dokumen Chain of Custody. Hasil penelitian ini berupa hasil analisis video rekaman kamera CCTV tentang karakteristik bukti digital dan informasi metadata yang digunakan untuk memberikan penjelasan komprehensif secara terstruktur serta acuan pengelolaan informasi data yang didapat dari hasil investigasi digital forensik yang dapat dipertanggungjawabkan dalam persidangan. Kata kunci: Bukti Digital, Live Forensik, Metadata, Kamera CCTV, Chain of Custody. Abstract Conventional crimes that are recorded on CCTV (Closed Circuit Television) cameras are increasingly being found in society, every crime that commits certain crimes will be in accordance with statutory regulations. CCTV cameras have an important role in security, many of which are recorded by CCTV cameras used as digital evidence. The challenge is how the techniques required for special handling, digital forensics in searching for digital evidence of CCTV camera footage using the live forensic method, namely when the evidence is in an active state based on the latest SNI 27037: 2014 according to the framework reference Common Phases of Computer Forensics Investigation Models for in implement it into the Chain of Custody document. These results of this research are in the form of analysis of CCTV camera video recordings about the characteristics of digital evidence and metadata information used to provide a structured comprehensive explanation and reference data management information obtained from the results of digital forensic investigations that can be accounted for in court. Keywords: Digital Evidence, Live Forensic, Metadata, CCTV Camera, Chain of Custady.
APA, Harvard, Vancouver, ISO, and other styles
10

Harrison, S. J. "The Speaking Book: The Prologue to Apuleius' Metamorphoses." Classical Quarterly 40, no. 2 (December 1990): 507–13. http://dx.doi.org/10.1017/s000983880004307x.

Full text
Abstract:
at ego tibi sermone isto Milesio varias fabulas conseram auresque tuas benivolas lepido susurro permulceam, modo si papyrum Aegyptiam argutia Nilotici calami inscriptam non spreveris inspicere. figuras fortunasque hominum in alias imagines conversas et in se rursum mutuo nexu refectas, ut mireris, exordior. ‘quis ille?’ paucis accipe. Hymettos Attica et Isthmos Ephyrea et Taenaros Spartiatica, glebae felices aeternum libris felicioribus conditae, mea vetus prosapia est; ibi linguam Atthidem primis pueritiae stipendiis merui, mox in urbe Latia advena studiorum Quiritium indigenam sermonem aerumnabili labore nullo magistro praeeunte aggressus excolui. en ecce praefamur veniam, si quid exotici ac forensis sermonis rudis locutor offendero. iam haec equidem ipsa vocis immutatio desultoriae scientiae stilo quern accessimus respondet. fabulam Graecanicam incipimus. lector intende: laetaberis.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Forensis"

1

Cembalo, Maurizio. "Forensic analysis for digital images." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/227.

Full text
Abstract:
IX n.s.
Nowadays, taking and sharing digital pictures is becoming a very popular activity. This is witnessed by the explosive growth of the digital cameras market: e.g., more than one billion of digital cameras have been produced and shipped in 2010. A consequence of this trend is that also the number of crimes involving digital pictures increases, either because pictures are part of the crime (e.g., exchanging pedopornographic pictures) or because their analysis may reveal some important clue about the author of the crime. The highly technical nature of computer crimes facilitated a wholly new branch of forensic science called digital forensics. The Digital Forensic Sci- ence involves processes such as acquisition of data from an electronic source, analysis of the acquired data, extraction of evidence from the data, and the preservation and presentation of the evidence. Digital Imaging Forensics is a specialization of the Digital Forensics which deals with digital images. One of the many issues that the Digital Imaging Forensics tries to deal with is the source camera identi cation problem, i.e., establish if a given image has been taken by a given digital camera. Today this is a practical and important problem aiming to identify reliably the imaging device that acquired a particular digital image. Techniques to authenticate an electronic image are especially important in court. For example, identifying the source device could establish the origin of images presented as evidence. In a prosecution for child pornography, for example, it could be desirable that one could prove that certain imagery was obtained with a speci c camera and is thus not an image generated by a computer, given that "virutal images" are not considered offense. As electronic images and digital video replace their analog counterparts, the importance of reliable, inexpensive, and fast identification of the origin of a particular image will increase. The identification of a source camera of an image is a complex issue which requires the understanding of the several steps involved in the creation of the digital photographic representation of a real scene. In particular, it is necessary to understand how the digital images are created, which are the processes which create (and therefore affect) the creation of the digital data, starting from the real scene. Moreover, it is necessary to point out the factors which can be used to support the camera identification and, may be even more important, which are the factors which can tamper the photos and prevent (maliciously or not) the camera identification. Many identification techniques have been proposed so far in literature. All these techniques generally work by using the sensor noise (an unexpected variation of the digital signal) left by a digital sensor when taking a picture as a fingerprint for identifying the sensor. These studies are generally accompanied with tests proving the effectiveness of these techniques, both in terms of False Acceptance Rate (FAR) and False Rejection Rate (FRR). Unfortunately, most of these contributions do not take into consideration that, in practice, the images that are shared and exchanged over the Internet have often been pre-processed. Instead, it is a common practice to assume that the images to be examined are unmodified or, at most, to ignore the e ects of the pre-processing. Even without considering the case of malicious users that could intention- ally process a picture in order to fool the existing identification techniques, this assumption is unrealistic for at least two reasons. The first is that, as previously mentioned, almost all current photo-managing software o ers several functions for adjusting, sometimes in a "magic" way (see the "I'm feeling lucky" function on Google Picasa) different characteristics of a picture. The second reason can be found in the way the images are managed by some of the most important online social network (OSN) and online photo sharing (OPS) sites. These services usually make several modifications to the original photos before publishing them in order to either improve their appearance or reduce their size. In this thesis we have first implemented the most prominent source camera identification technique, proposed by Lukas et al. and based on the Photo-Response Non-Uniformity. Then, we present a new identification technique that use a SVM (Support Vector Macchine) classifier to associate photos to the right camera. Both our implementation of Lukas et al. technique and our SVM technique have been extensively tested on a test-sample of nearly 2500 images taken from 8 different cameras. The main purpose of the experiments conducted is to see how these techniques performs in presence of pre-processed images, either explicit modified by a user with photo management tools or modified by OSNs and OPSs services without user awareness. The results confirm that, in several cases, the method by Lukas et al. and our SVM technique is resilient to the modifications introduced by the considered image-processing functions. However, in the experiments it has been possible to identify several cases where the quality of the identifica- tion process was deteriorated because of the noise introduced by the image- processing. In addition, when dealing with Online Social Networks and Online Photo Sharing services, it has been noted that some of them process and modify the uploaded pictures. These modifications make ineffective, in many cases, the method by Lukas et al. while SVM technique performs slightly better. [edited by author]
2009 - 2010
APA, Harvard, Vancouver, ISO, and other styles
2

Brancoli, Daniel Luz 1986. "O efeito da ivermectina na duração das fases de decomposição, sobre os insetos necrófagos e interpretação termográfica da distribuição espacial da massa larval de dípteros em carcaças de cabras (Capra aegragrus hircus L.,1758)." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/317460.

Full text
Abstract:
Orientador: Arício Xavier Linhares
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Biologia
Made available in DSpace on 2018-08-23T07:56:31Z (GMT). No. of bitstreams: 1 Brancoli_DanielLuz_M.pdf: 2919175 bytes, checksum: 945c65bec3a80aec88b5f6b239293fd2 (MD5) Previous issue date: 2013
Resumo: A estimativa do intervalo pós-morte (IPM), período entre a ocorrência da morte e o momento em que o corpo ou carcaça é encontrado, é uma das principais utilizações de insetos na área forense. A partir de informações sobre a biologia, ecologia e distribuição geográfica dos insetos, bem como do comportamento de toda fauna presente em um corpo é possível estimar o menor intervalo da ocorrência da morte. Diversos fatores tais como temperatura, umidade, presença de substâncias tóxicas nos tecidos de uma carcaça, podem interferir no ciclo de vida de um inseto, afetando diretamente a estimativa do IPM quando esta é baseada em parâmetros biológicos do inseto. Por isso, múltiplos fatores devem ser considerados para que a perícia seja mais precisa. Com o aumento no número de mortes de animais de importância econômica devido à intoxicação medicamentosa, se faz necessárias pesquisas voltadas para a entomotoxicologia, uma área que carece de estudos específicos. Assim, o presente trabalho visou identificar a entomofauna associada a carcaças de cabras (Capra aegagrus hircus L.) mortas após tratamento com ivermectina, expostas em ambiente natural, além de averiguar possíveis diferenças na atratividade, no desenvolvimento dos imaturos que utilizaram esse substrato para alimentação e se a temperatura e o padrão de colonização da massa larval divergem entre as carcaças de animais mortos por intoxicação. Esse último parâmetro foi avaliado por meio de registros termográficos realizados em intervalos de 12 horas. Além da importância de fatores abióticos como luminosidade, temperatura, umidade e pluviosidade, pôde-se observar a ação da ivermectina nas carcaças tratadas, interferindo na composição da fauna colonizadora, no tempo total e em cada estágio da decomposição, assim como no padrão físico e comportamental das massas larvais em comparação ao grupo controle. Ainda foi demonstrado que a termografia pode ser utilizada como uma nova ferramenta em estudos periciais, auxiliando de forma significativa a avaliação dos parâmetros das massas larvais
Abstract: The estimation of the postmortem interval (PMI), period between the occurrence of death and the time at which the body or casing is found, is one of the main uses of insects in the forensic field. Using information on the biology, ecology and geographical distribution of insects, as well as the behavior of the entire fauna present in a body, is possible to estimate the time of death. Several factors such as temperature, humidity, presence of toxic substances in the tissues of a carcass, may interfere with the life cycle of an insect, directly affecting the estimate of PMI when it is based on biological parameters of the insect. Therefore, multiple factors should be considered so that the forensic analysis is more accurate. With the increase in the number of animal's deaths of economic importance due to drug intoxication, becomes necessary a research on entomotoxicology, an area with lack of specific studies. Thus, the present study aimed to identify the insect fauna associated with carcasses of goats (Capra aegagrus hircus L.) killed after treatment with ivermectin and exposed in the natural environment. Still, investigate possible differences in attractiveness, the immature development that used this substrate for feeding and if the temperature and the colonization pattern of larval mass differ between carcasses of animals killed after ivermectin inoculation. This last parameter was evaluated by thermographic shots performed at intervals of 12 hours. Besides the importance of abiotic factors such as luminosity, temperature, humidity and rainfall, the action of ivermectin on carcasses couse interferense in the composition of the colonizing fauna, the total time of colonization and the time of the decomposition stages, as well as the physical patterns and behavior of larval masses compared to the control group. Although it has been shown that thermography can be used as a new tool in forensic studies, helping to evaluate the parameters of larval mass
Mestrado
Parasitologia
Mestre em Parasitologia
APA, Harvard, Vancouver, ISO, and other styles
3

Andersson, Roland. "Utvinning av data ur mobiltelefoner : En valideringsstudie av forensiska verktyg." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31556.

Full text
Abstract:
Den vetenskapliga aspekten i de flesta forensiska discipliner är välgrundad och prövad under ett långt tidsperspektiv. Det ökande användandet av digital teknik har gjort att en ny forensisk disciplin har vuxit fram och den vetenskapliga grunden i detta nya forensiska område är i många avseenden fortfarande outforskat. Inom det svenskarättsväsendet krävs att de forensiska metoder som används inom en brottsutredning ska vara kvalitetssäkrade och i största mån vara ackrediterade av ettackrediteringsorgan. Det finns idag få relevanta studier kring validering av forensiska metoder som hanterar småskaliga enheter som smarta mobiler. I denna rapport analyseras de metoder som används för att utvinna data från mobiltelefon och hur dessa metoder kan anses vara forensiskt korrekta. Rapporten presenterar ett nytt ramverk för att validera de metoder som används av ett forensisk verktyg. Ramverket är kvalitetssäkrat genom att utgå ifrån tidigare vetenskaplig studier och är praktiskt testad i laboratoriemiljö. Ramverket ska kunna användas direkt inom en forensisk verksamhet som kräver validering.
The scientific aspect in most forensic disciplines is well founded and examined under a long-term perspective. The increasing use of digital technology has enabled a new forensic discipline and the scientific basis of the digital forensic field is in many respects still unexplored. The Swedish legal system requires that the forensic methods used in a criminal investigation should be quality assured and in the largest extent be accredited by an accreditation body. There are few relevant studies on the validation of forensic methods that handle small scale devices such as smartphones. This report analyzes the methods used to extract data from a mobile phone and how these methods can be considered forensically sound. The report presents a new framework for validating the methods used by a forensic tool. The framework is quality assured by referring to previous scientific studies and practically tested in a laboratory environment. The framework can be used directly in a forensic organization that requires validation.
APA, Harvard, Vancouver, ISO, and other styles
4

Pais, Rosa Maria da Silva Dias. "Aplicação das ciências forenses no ensino secundário: um conjunto de actividades para a disciplina de Física e Química A." Master's thesis, Universidade de Évora, 2009. http://hdl.handle.net/10174/18526.

Full text
Abstract:
A popularidade das séries televisivas que abordam as Ciências Forenses (CSI 1 Mentes Criminosas, Casos Arquivados...) permite construir actividades que envolvem os alunos numa exploração científica de modo a que dominem os conceitos e apreciem a natureza da Ciência. Estes recursos educativos aplicam uma abordagem Ciência­ Tecnologia-Sociedade -Pensamento Crítico (CTS-PC) e podem ser explorados segundo uma metodologia de Aprendizagem Baseada na Resolução de Problemas (ABRP). Neste trabalho são propostas actividades laboratoriais, a decorrer no contexto formal das aulas da disciplina de Física e Química A (FQ·A), utilizando sensores e a calculadora gráfica. Num contexto não-formal, e baseadas nas técnicas analíticas utilizadas em Ciências Forenses, foram desenvolvidas actividades para um Clube de Ciência ou Laboratórios Abertos, complementadas por um blogue (CSI-Mafra). Estes recursos foram posteriormente partilhados com outros professores de Física e Química, numa acção de formação, proposta pela autora, e cujo objectivo principal foi a diversificação das estratégias de ensino e aprendizagem. O entusiasmo dos alunos na realização das tarefas propostas e os resultados nos questionários de grau de satisfação e de opinião, aplicados a alunos e professores, sugere que as actividades desenvolvidas podem contribuir na motivação dos alunos para o estudo da Física e da Química e promover a literacia científica da comunidade escolar. ABSTRACT; The high popularity between teenagers of the television series that have Forensic Sciences and Criminal lnvestigations as central theme, such as CSI, Dexter, Criminal Minds and Cold Case, can be used to develop learning activities that involves the students into a scientific exploration which aim is leading the students to learn Chemistry and Physics with pleasure, motivation and curiosity. The educational resources developed in this thesis make use of the strategy Science-Technology-Society-Critical Thinking (STS-CP) and can be exploited according the teaching methodology Problem Based Learning (PBL). ln this work we propose a number of laboratory activities that can be used on the classes of the High School course Physic and Chemistry A (FQ-A) and a different set of activities to be used in a non-formal teaching environment, which are based on the analytical techniques used in Forensic Sciences. The non-formal activities were developed as part of the activities of a Science Club and complemented with an interactive blog. The teaching resources developed by us were also used in a professional training course to physics and chemistry teachers aimed to teach how to introduce new teaching­ learning strategies. The enthusiasm of the students shown during the activities and the extremely positive results of the questionnaires, applied to students and teachers after the activities, clearly indicates that the learning resources developed in this thesis contribute to the student's motivation to learn Physic and Chemistry and to promote the scientific Iiteracy of the scholar community.
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Avinash. "A Digital Forensic Readiness Approach for Ransomware Forensics." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/75610.

Full text
Abstract:
Computers play a vital role in the automation of tedious tasks in our everyday lives. With the adoption of the advances in technology, there is a significant increase in the exploitation of security vulnerabilities, particularly in Windows computing environments. These exploitations are mostly carried out by malicious software (malware). Ransomware, a variant of malware which encrypts user files and retains the decryption key for ransom. Ransomware has shown its dominance over the years wreaking havoc to many organizations and users. This global digital epidemic is continuously on the rise with no signs of being eradicated. The current method of mitigation and propagation of malware and its variants, such as anti-viruses, have proven ineffective against most ransomware attacks. Theoretically, Ransomware retains footprints of the attack process in the Windows Registry as well as volatile memory of the infected machine. With the adoption of Digital Forensic Readiness (DFR) processes organizations can better prepare for these types of attacks. DFR provides mechanisms for pro-active collection of digital artifacts. These artifacts play a vital role when a digital investigation is conducted where these artifacts may not be available post-incident. The availability of such artifacts can be attributed to the anti-forensic properties of the ransomware itself cleaning up all the evidence before it can be investigated. Ransomware investigation often to a lengthy process because security researchers need to disassemble and reverse engineer the ransomware in order to find a inherit flaw in the malware. In some cases, the ransomware is not available post-incident which makes it more difficult. Therefore, study proposed a framework with the integration of DFR mechanisms as a process to mitigate ransomware attacks whilst maximizing Potential Digital Evidence (PDE) collection. The proposed framework was evaluated in compliance with the ISO/IEC 27043 standard as well as expert review using two prototype tools. These prototype tools realize the framework by providing a proof of concept implementation of such a framework within an organization. The evaluation revealed that the proposed framework has the potential to harness system information prior to, and during a ransomware attack. This information can then be used to help forensic investigators to potentially decrypt the encrypted machine, as well as providing automated analysis of the ransomware relieving the burden of complicated analysis. The implementation of the proposed framework can potentially be a major breakthrough in mitigating this global digital endemic that has plagued various organizations.
Dissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc (Computer Science)
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
6

Bade, Hans, and Oscar Hedlund. "Anti-Forensik : Anti-forensiska metoder på mobila enheter." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701.

Full text
Abstract:
Mobiltelefoner har blivit grundläggande för extrahering av digitala artefakter i fo-rensiska utredningar. Androids Linuxbaserade operativsystem medför större möj-ligheter för anti-forensiska metoder, detta gör att kunskap om anti-forensik äressentiell för dagens IT-forensiska utredare. I denna studie belyses effekten avanti-forensik i Androidbaserade mobila enheter samt så upplyses det om dagensanti-forensiska attack metoder mot forensiska verktyg. Genom experiment så vi-sas det hur man kan förhindra ett forensisk verktyg från att extrahera data medanvändning av ett simpelt script.
Mobile phones have become essential for the extraction of digital artifacts in foren-sic investigations. Android’s Linux-based operating systems bring greater potentialfor anti-forensic methods, which means that knowledge of anti-forensics is essen-tial to today’s IT forensic investigators. In this study, the effect of anti-forensicson Android-based mobile devices is highlighted, as well as revealing today’s anti-forensic attack methods against forensic tools. By experiment, it is shown how toprevent a forensic tool from extracting data by using a simple script.
APA, Harvard, Vancouver, ISO, and other styles
7

Silva, Alexandre Alberto Gonçalves da. "A perícia forense no Brasil." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-11082010-152328/.

Full text
Abstract:
Este trabalho apresenta um olhar sobre a atividade forense começando no antigo Egito, berço da civilização ocidental, passando pela colonização portuguesa e sua influência, até chegar ao Brasil atual, trazendo os elementos interdisciplinares característicos da perícia em cada período histórico. Dado a este caráter interdisciplinar, o trabalho tenta demonstrar quais foram as bases legislativas em cada época. O objetivo foi identificar os problemas que surgiram ao longo do tempo para o exercício da perícia como auxiliar da Justiça, assim como destacar elementos que possam melhorar a relação entre peritos, juízes e partes, tendo em vista o resultado de seu trabalho: o laudo pericial.
This work presents a look at the forensic activity starting in ancient Egypt, the cradle of Western civilization, through the Portuguese colonization and their influence, until getting to Brazil nowadays, with the aim to bring the characteristic elements of interdisciplinary expertise in every historical period. Given its interdisciplinary character, this essay attempts to point which legislative bases had experts to carry out their activities. The aim was to identify the elements which analyzed the problems that have arisen over time to the exercise of skill as an activity assistant, as well as to highlight areas that may assist the improvement of the activity for forensics, judges and parties, as well as the final result of his work: the expert report.
APA, Harvard, Vancouver, ISO, and other styles
8

Howard, Sean David. "Customization and automation in the future of digital forensics live OS forensics with FENIX (forensic examiner unix) /." [Ames, Iowa : Iowa State University], 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tagesson, Samuel. "Anti-forensik mot minnesforensik : En litteraturstudie om anti-forensiska metoder mot minnesdumpning och minnesanalys." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17818.

Full text
Abstract:
IT-forensiker möter många svårigheter i sitt arbete med att inhämta och analysera data. Brottslingar använder mer och mer anti-forensiska metoder för att gömma bevis som kan användas emot dem. En vanligt förekommande anti-forensisk metod är kryptering. För att IT-forensiker skall kunna komma åt den krypterade informationen kan krypteringsnyckeln hittas i minnet på datorn. Vilket gör att datorns minne blir värdefullt att hämta och analysera. Däremot finns det flera anti-forensiska metoder som en förbrytare kan använda för att förhindra att minnet hämtas eller analyseras. Denna studie utför en systematisk litteraturstudie för att identifiera de aktuella anti-forensiska metoder mot minnesanalys och minnesdumpning på Windows system. Flera metoder tas upp där bland annat operativsystemet modifieras eller inbyggda säkerhetsfunktioner på CPUn används för att förhindra att information hämtas eller analyseras från minnet.
IT forensics face many difficulties in their work of obtaining and analyzing data. Criminals are using more and more anti-forensic methods to hide evidence that can be used against them. One common anti-forensic method is encryption. In order for IT forensics to access the encrypted information, the encryption key can be found in the memory of the computer. This makes the computer's memory valuable to retrieved and analyze. However, there are several anti-forensic methods that a criminal can use to prevent the memory from being retrieved or analyzed. This study performs a systematic literature study to identify the current anti-forensic methods against memory analysis and memory dumping on Windows system. Several methods are addressed where, among other things, the operating system is modified or built-in security functions on the CPU are used to prevent information being retrieved or analyzed from memory.
APA, Harvard, Vancouver, ISO, and other styles
10

Marziale, Lodovico. "Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.

Full text
Abstract:
Digital forensics is the science concerned with discovering, preserving, and analyzing evidence on digital devices. The intent is to be able to determine what events have taken place, when they occurred, who performed them, and how they were performed. In order for an investigation to be effective, it must exhibit several characteristics. The results produced must be reliable, or else the theory of events based on the results will be flawed. The investigation must be comprehensive, meaning that it must analyze all targets which may contain evidence of forensic interest. Since any investigation must be performed within the constraints of available time, storage, manpower, and computation, investigative techniques must be efficient. Finally, an investigation must provide a coherent view of the events under question using the evidence gathered. Unfortunately the set of currently available tools and techniques used in digital forensic investigations does a poor job of supporting these characteristics. Many tools used contain bugs which generate inaccurate results; there are many types of devices and data for which no analysis techniques exist; most existing tools are woefully inefficient, failing to take advantage of modern hardware; and the task of aggregating data into a coherent picture of events is largely left to the investigator to perform manually. To remedy this situation, we developed a set of techniques to facilitate more effective investigations. To improve reliability, we developed the Forensic Discovery Auditing Module, a mechanism for auditing and enforcing controls on accesses to evidence. To improve comprehensiveness, we developed ramparser, a tool for deep parsing of Linux RAM images, which provides previously inaccessible data on the live state of a machine. To improve efficiency, we developed a set of performance optimizations, and applied them to the Scalpel file carver, creating order of magnitude improvements to processing speed and storage requirements. Last, to facilitate more coherent investigations, we developed the Forensic Automated Coherence Engine, which generates a high-level view of a system from the data generated by low-level forensics tools. Together, these techniques significantly improve the effectiveness of digital forensic investigations conducted using them.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Forensis"

1

Anselm, Franke, Weizman Eyal, and Haus der Kulturen der Welt, eds. Forensis: The architecture of public truth. Berlin: Sternberg Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leeuwen, Simon van. Part I, book V of Censura forensis: Theoretico-practica. 4th ed. Pretoria: Published by the Govt. Printer on behalf of the South African Law Commission, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lo spettacolo della giustizia: Le orazioni di Cicerone. Palermo: Flaccovio, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Muda, Azah Kamilah, Yun-Huoy Choo, Ajith Abraham, and Sargur N. Srihari, eds. Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05885-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hamline University. Advanced Legal Education., ed. Forensics on trial: Forensic science in the courtroom, August 4, 1988. St. Paul, MN: Advanced Legal Education, Hamline University School of Law, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Windows registry forensics: Advanced digital forensic analysis of the Windows registry. Burlington, MA: Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gregory, Kipper, and ScienceDirect (Online service), eds. Virtualization and forensics: A digital forensic investigator's guide to virtual environments. Amsterdam: Syngress/Elsevier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1939-, Murphy Brian, and Morrison Robert D, eds. Introduction to environmental forensics. 2nd ed. Amsterdam: Academic Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1939-, Murphy Brian, and Morrison Robert D, eds. Introduction to environmental forensics. San Diego, Calif: Academic, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

J, Sullivan Patrick. Practical environmental forensics: Process and case histories. New York: John Wiley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Forensis"

1

Mrdovic, Sasa. "IoT Forensics." In Security of Ubiquitous Computing Systems, 215–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_13.

Full text
Abstract:
AbstractThis chapter provides an overview of research opportunities and issues in IoT forensics. It gives a quick introduction to forensics and digital forensics. Key specifics of IoT forensics are explained. Issues that arise from IoT related challenges in all phases of a forensic investigation are presented. Some opportunities that IoT brings to forensics are pointed out. An example of an IoT forensics case is provided. A detailed research overview is given, providing information on the main research directions with a brief overview of relevant papers. The chapter concludes with some ideas for future research.
APA, Harvard, Vancouver, ISO, and other styles
2

Nordvik, Rune. "Ext4." In Mobile Forensics – The File Format Handbook, 41–68. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_2.

Full text
Abstract:
AbstractThe Ext4 file system is often used by Android cell phones and by Linux distributions. As a mobile forensic expert, it is necessary to understand the structures of this file system to recover data, verify tool results, and detect anti-forensics techniques that may be present in the file system. In this chapter, we will have a deep dive into topics important for an investigation. Many digital forensic tools do not recover much from the Ext4 file system [52], and therefore we show some of the most useful Ext4 recovery techniques proposed by current research.The Ext4 file system is often used by Android1 operating systems, and also by Linux desktop distributions [14], and this file system is open source. The Ext4 file system replaces the Ext2 and Ext3, but it is mostly backwards compatible. Carrier described Ext2 and Ext3 in his File System forensic analysis book [10], which includes information also relevant for Ext4. Fairbanks describes the Ext4 file system at a low level and from a Digital Forensics perspective. This chapter will describe file system information important for mobile forensic investigators and other digital forensic experts.
APA, Harvard, Vancouver, ISO, and other styles
3

Stamm, Matthew C., and Xinwei Zhao. "Anti-Forensic Attacks Using Generative Adversarial Networks." In Multimedia Forensics, 467–90. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_17.

Full text
Abstract:
AbstractThe rise of deep learning has led to rapid advances in multimedia forensics. Algorithms based on deep neural networks are able to automatically learn forensic traces, detect complex forgeries, and localize falsified content with increasingly greater accuracy. At the same time, deep learning has expanded the capabilities of anti-forensic attackers. New anti-forensic attacks have emerged, including those discussed in Chap. 10.1007/978-981-16-7621-5_14 based on adversarial examples, and those based on generative adversarial networks (GANs). In this chapter, we discuss the emerging threat posed by GAN-based anti-forensic attacks. GANs are a powerful machine learning framework that can be used to create realistic, but completely synthetic data. Researchers have recently shown that anti-forensic attacks can be built by using GANs to create synthetic forensic traces. While only a small number of GAN-based anti-forensic attacks currently exist, results show these early attacks are both effective at fooling forensic algorithms and introduce very little distortion into attacked images.
APA, Harvard, Vancouver, ISO, and other styles
4

Piva, Alessandro, and Massimo Iuliani. "Integrity Verification Through File Container Analysis." In Multimedia Forensics, 363–87. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_14.

Full text
Abstract:
AbstractIn the previous chapters, multimedia forensics techniques based on the analysis of the data stream, i.e., the audio-visual signal, aimed at detecting artifacts and inconsistencies in the (statistics of the) content were presented. Recent research highlighted that useful forensic traces are also left in the file structure, thus offering the opportunity to understand a file’s life-cycle without looking at the content itself. This chapter is then devoted to the description of the main forensic methods for the analysis of image and video file formats.
APA, Harvard, Vancouver, ISO, and other styles
5

Hummert, Christian, and Georgina Louise Humphries. "Property Lists." In Mobile Forensics – The File Format Handbook, 157–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_6.

Full text
Abstract:
AbstractProperty List files (*.plist) are a widely used data storage format used by Apple software. Most of the system properties are stored in plists, but also, many apps store their configuration in plist-files. The data held within Property is regularly of high evidential value for forensic analysts, so understanding the format is essential for the forensic investigation of Apple mobile devices and computers. Not all of today’s digital forensics tools recover plists properly. Especially for carved or damaged plists, the support is insufficient. So the forensic examiner must understand the principles of this file format. This chapter gives an overview of the plist structure to give the examiner the knowledge to get the most information out of the evidence possible.
APA, Harvard, Vancouver, ISO, and other styles
6

Mahmood, Wakas, Hamid Jahankhani, and Aykut Ozkaya. "Cloud Forensics Challenges Faced by Forensic Investigators." In Communications in Computer and Information Science, 74–82. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23276-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vella, Mark, and Christian Colombo. "D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage." In ICT Systems Security and Privacy Protection, 161–78. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8_10.

Full text
Abstract:
AbstractDifficulties with accessing device content or even the device itself can seriously hamper smartphone forensics. Mobile cloud storage, which extends on-device capacity, provides an avenue for a forensic collection process that does not require physical access to the device. Rather, it is possible to remotely retrieve credentials from a device of interest through undercover operations, followed by live cloud forensics. While technologically appealing, this approach raises concerns with evidence preservation, ranging from the use of malware-like operations, to linking the collected evidence with the physically absent smartphone, and possible mass surveillance accusations. In this paper, we propose a solution to ease these concerns by employing hardware security modules to provide for controlled live cloud forensics and tamper-evident access logs. A Google Drive-based proof of concept, using the SEcube hardware security module, demonstrates that D-Cloud-Collector is feasible whenever the performance penalty incurred is affordable.
APA, Harvard, Vancouver, ISO, and other styles
8

Houck, Max M. "Front-End Forensics: An Integrated Forensic Intelligence Model." In Advanced Sciences and Technologies for Security Applications, 161–80. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41287-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dija, S., T. R. Deepthi, C. Balan, and K. L. Thomas. "Towards Retrieving Live Forensic Artifacts in Offline Forensics." In Communications in Computer and Information Science, 225–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34135-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Koppl, Roger G. "Romancing Forensics: Legal Failure in Forensic Science Administration." In The Pursuit of Justice, 51–70. New York: Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230109490_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Forensis"

1

Peisert, Sean, Matt Bishop, and Keith Marzullo. "Computer Forensics in Forensis." In 2008 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2008. http://dx.doi.org/10.1109/sadfe.2008.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yan Ng, Tsz, and Wes McGee. "Public Domesticity - Digital Fabrication and Design-Build in Detroit." In 2018 ACSA International Conference. ACSA Press, 2018. http://dx.doi.org/10.35483/acsa.intl.2018.8.

Full text
Abstract:
[F]orensis is used to interrogate the relation between the two constitutive sites of forensics-namely fields and forums. In forensic terms the division is straightforward; the field is the site of investigation and the forum is the place where the results of an investigation are presented and contested. However, both these sites must be understood to be more than mere locational designations. The field is not only a neutral, abstract grid on which traces of a crime can be plotted out, but itself a dynamic and elastic territory, a force field that is shaped by but also shapes conflict. The forum, in turn, is a composite apparatus. It is constituted as a shifting triangulation between three elements: a contested object or site, an interpreter tasked with translating “the language of things,” and the assembly of a public gathering. Forensis thus establishes a relation between the animation of material objects and the gathering of political collectives.
APA, Harvard, Vancouver, ISO, and other styles
3

Moch, Christian, and Felix C. Freiling. "The Forensic Image Generator Generator (Forensig2)." In 2009 Fifth International Conference on IT Security Incident Management and IT Forensics. IEEE, 2009. http://dx.doi.org/10.1109/imf.2009.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Punjabi, Sunil K., and Suvarna Chaure. "Forensic Intelligence- Combining Artificial Intelligence with Digital Forensics." In 2022 International Conference on Intelligent Technologies (CONIT). IEEE, 2022. http://dx.doi.org/10.1109/conit55038.2022.9848406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guilhen, Bruno Anselmo, Regina Melo Silveira, and Sergio Takeo Kofuji. "Computação Forense em Redes Definidas por Software (SDN): Uma revisão de literatura." In Workshop de Pesquisa Experimental da Internet do Futuro. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/wpeif.2021.17195.

Full text
Abstract:
As redes definidas por software (SDN) representam o estado da arte em estruturas de redes que estão sendo adotadas por diversas empresas e provedores de serviços. Junto deste novo desafio de implantar e operar redes baseadas em software, existe a necessidade de garantir a segurança em todos os aspectos da rede. Neste contexto, surge a temática da computação forense em redes SDN, que visa estabelecer os mecanismos para fazer o levantamento correto e apurar os dados sobre os incidentes de segurança. Portanto, o artigo contribui com uma revisão de literatura ao realizar um levantamento das principais técnicas forenses que foram aplicadas em redes SDN comparando com as técnicas forenses tradicionais como elas se relacionam e se completam.
APA, Harvard, Vancouver, ISO, and other styles
6

Kiltz, Stefan, Jana Dittmann, and Claus Vielhauer. "Supporting Forensic Design - A Course Profile to Teach Forensics." In 2015 Ninth International Conference on IT Security Incident Management & IT Forensics (IMF). IEEE, 2015. http://dx.doi.org/10.1109/imf.2015.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mumba, Emilio Raymond, and H. S. Venter. "Mobile forensics using the harmonised digital forensic investigation process." In 2014 Information Security for South Africa (ISSA). IEEE, 2014. http://dx.doi.org/10.1109/issa.2014.6950491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McKay, Christine, Ashwin Swaminathan, Hongmei Gou, and Min Wu. "Image acquisition forensics: Forensic analysis to identify imaging source." In ICASSP 2008 - 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2008. http://dx.doi.org/10.1109/icassp.2008.4517945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hankins, Ryan, Tetsutaroh Uehara, and Jigang Liu. "A Comparative Study of Forensic Science and Computer Forensics." In 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI). IEEE, 2009. http://dx.doi.org/10.1109/ssiri.2009.42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reeva, Patel, Dhuri Siddhesh, Gada Preet, Shah Pratik, and Nilakshi Jain. "Digital Forensics Capability Analyzer: A tool to check forensic capability." In 2019 International Conference on Nascent Technologies in Engineering (ICNTE). IEEE, 2019. http://dx.doi.org/10.1109/icnte44896.2019.8945960.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Forensis"

1

Rodriguez, Michelle M., and Jeffrey L. Duffany. Introduction to Forensics and the Use of the Helix Free Forensic Tool. Fort Belvoir, VA: Defense Technical Information Center, January 2012. http://dx.doi.org/10.21236/ada582973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hopcroft, John E. Information Forensics. Fort Belvoir, VA: Defense Technical Information Center, February 2010. http://dx.doi.org/10.21236/ada562577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cassata, W., N. Gharibyan, B. Isselhardt, J. Matzel, and T. Parsons-Davis. Nuclear Forensics. Office of Scientific and Technical Information (OSTI), April 2022. http://dx.doi.org/10.2172/1866160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Matey, James. Forensic Iris:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ng, B. M., and N. C. Perry. National Security Forensics. Office of Scientific and Technical Information (OSTI), October 2011. http://dx.doi.org/10.2172/1114703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Scott, Mark R. Nuclear Reactor Forensics. Office of Scientific and Technical Information (OSTI), July 2013. http://dx.doi.org/10.2172/1087613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ayers, Rick, and Wayne Jansen. PDA forensic tools :. Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Simpson, William R., and Coimbatore Chandersekaran. Cloud Forensics Issues. Fort Belvoir, VA: Defense Technical Information Center, July 2014. http://dx.doi.org/10.21236/ada604902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beebe, Merilyn Amy. Nuclear forensics: Soil content. Office of Scientific and Technical Information (OSTI), August 2015. http://dx.doi.org/10.2172/1213518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rundberg, Robert S. Post-detonation Nuclear Forensics. Office of Scientific and Technical Information (OSTI), May 2013. http://dx.doi.org/10.2172/1078366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography