Academic literature on the topic 'Forensis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Forensis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Forensis"
Peisert, Sean, Matt Bishop, and Keith Marzullo. "Computer forensics in forensis." ACM SIGOPS Operating Systems Review 42, no. 3 (April 2008): 112–22. http://dx.doi.org/10.1145/1368506.1368521.
Full textKirn, Gal, and Niloufar Tajeri. "The Age of Forensics: Memory, Emancipatory Politics or Visual Strategy? Interview with Eyal Weizman and Anselm Franke." Maska 31, no. 177 (June 1, 2016): 14–35. http://dx.doi.org/10.1386/maska.31.177-178.14_7.
Full textMitas, Stergios. "Crimen publicum, poena forensis." Archiv fuer Rechts- und Sozialphilosophie 106, no. 4 (2020): 554. http://dx.doi.org/10.25162/arsp-2020-0027.
Full textФиляк, Петр Юрьевич, Сергей Владимирович Королев, and Никита Владимирович Тебеньков. "ENSURING THE INFORMATION SECURITY WITH THE USE OF TOOLS OF FORENSICS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 4(-) (December 15, 2021): 571–80. http://dx.doi.org/10.36622/vstu.2021.24.4.009.
Full textApter, Emily. "Shibboleth: Policing by Ear and Forensic Listening in Projects by Lawrence Abu Hamdan." October 156 (May 2016): 100–115. http://dx.doi.org/10.1162/octo_a_00253.
Full textSlipets, O. "THEORETICAL ASPECTS OF FORENSIS-PSYCHOLOGICAL EXAMINATION OF TYPOLOGICAL FEATURES OF PERSONALITY." Theory and Practice of Forensic Science and Criminalistics 20, no. 2 (December 4, 2019): 505–21. http://dx.doi.org/10.32353/khrife.2.2019.40.
Full textRothwell, Gar W. "BOTRYOPTERIS FORENSIS (BOTRYOPTERIDACEAE), A TRUNK EPIPHYTE OF THE TREE FERN PSARONIUS." American Journal of Botany 78, no. 6 (June 1991): 782–88. http://dx.doi.org/10.1002/j.1537-2197.1991.tb14479.x.
Full textMazo Gómez, Wilson De Jesús. "La tradición católica, su influencia en la conformación del rol de la mujer en la familia tradicional colombiana y su relación con la violencia de pareja al interior de ésta." Ratio Juris 14, no. 28 (October 17, 2019): 219–52. http://dx.doi.org/10.24142/raju.v14n28a8.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textHarrison, S. J. "The Speaking Book: The Prologue to Apuleius' Metamorphoses." Classical Quarterly 40, no. 2 (December 1990): 507–13. http://dx.doi.org/10.1017/s000983880004307x.
Full textDissertations / Theses on the topic "Forensis"
Cembalo, Maurizio. "Forensic analysis for digital images." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/227.
Full textNowadays, taking and sharing digital pictures is becoming a very popular activity. This is witnessed by the explosive growth of the digital cameras market: e.g., more than one billion of digital cameras have been produced and shipped in 2010. A consequence of this trend is that also the number of crimes involving digital pictures increases, either because pictures are part of the crime (e.g., exchanging pedopornographic pictures) or because their analysis may reveal some important clue about the author of the crime. The highly technical nature of computer crimes facilitated a wholly new branch of forensic science called digital forensics. The Digital Forensic Sci- ence involves processes such as acquisition of data from an electronic source, analysis of the acquired data, extraction of evidence from the data, and the preservation and presentation of the evidence. Digital Imaging Forensics is a specialization of the Digital Forensics which deals with digital images. One of the many issues that the Digital Imaging Forensics tries to deal with is the source camera identi cation problem, i.e., establish if a given image has been taken by a given digital camera. Today this is a practical and important problem aiming to identify reliably the imaging device that acquired a particular digital image. Techniques to authenticate an electronic image are especially important in court. For example, identifying the source device could establish the origin of images presented as evidence. In a prosecution for child pornography, for example, it could be desirable that one could prove that certain imagery was obtained with a speci c camera and is thus not an image generated by a computer, given that "virutal images" are not considered offense. As electronic images and digital video replace their analog counterparts, the importance of reliable, inexpensive, and fast identification of the origin of a particular image will increase. The identification of a source camera of an image is a complex issue which requires the understanding of the several steps involved in the creation of the digital photographic representation of a real scene. In particular, it is necessary to understand how the digital images are created, which are the processes which create (and therefore affect) the creation of the digital data, starting from the real scene. Moreover, it is necessary to point out the factors which can be used to support the camera identification and, may be even more important, which are the factors which can tamper the photos and prevent (maliciously or not) the camera identification. Many identification techniques have been proposed so far in literature. All these techniques generally work by using the sensor noise (an unexpected variation of the digital signal) left by a digital sensor when taking a picture as a fingerprint for identifying the sensor. These studies are generally accompanied with tests proving the effectiveness of these techniques, both in terms of False Acceptance Rate (FAR) and False Rejection Rate (FRR). Unfortunately, most of these contributions do not take into consideration that, in practice, the images that are shared and exchanged over the Internet have often been pre-processed. Instead, it is a common practice to assume that the images to be examined are unmodified or, at most, to ignore the e ects of the pre-processing. Even without considering the case of malicious users that could intention- ally process a picture in order to fool the existing identification techniques, this assumption is unrealistic for at least two reasons. The first is that, as previously mentioned, almost all current photo-managing software o ers several functions for adjusting, sometimes in a "magic" way (see the "I'm feeling lucky" function on Google Picasa) different characteristics of a picture. The second reason can be found in the way the images are managed by some of the most important online social network (OSN) and online photo sharing (OPS) sites. These services usually make several modifications to the original photos before publishing them in order to either improve their appearance or reduce their size. In this thesis we have first implemented the most prominent source camera identification technique, proposed by Lukas et al. and based on the Photo-Response Non-Uniformity. Then, we present a new identification technique that use a SVM (Support Vector Macchine) classifier to associate photos to the right camera. Both our implementation of Lukas et al. technique and our SVM technique have been extensively tested on a test-sample of nearly 2500 images taken from 8 different cameras. The main purpose of the experiments conducted is to see how these techniques performs in presence of pre-processed images, either explicit modified by a user with photo management tools or modified by OSNs and OPSs services without user awareness. The results confirm that, in several cases, the method by Lukas et al. and our SVM technique is resilient to the modifications introduced by the considered image-processing functions. However, in the experiments it has been possible to identify several cases where the quality of the identifica- tion process was deteriorated because of the noise introduced by the image- processing. In addition, when dealing with Online Social Networks and Online Photo Sharing services, it has been noted that some of them process and modify the uploaded pictures. These modifications make ineffective, in many cases, the method by Lukas et al. while SVM technique performs slightly better. [edited by author]
2009 - 2010
Brancoli, Daniel Luz 1986. "O efeito da ivermectina na duração das fases de decomposição, sobre os insetos necrófagos e interpretação termográfica da distribuição espacial da massa larval de dípteros em carcaças de cabras (Capra aegragrus hircus L.,1758)." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/317460.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Biologia
Made available in DSpace on 2018-08-23T07:56:31Z (GMT). No. of bitstreams: 1 Brancoli_DanielLuz_M.pdf: 2919175 bytes, checksum: 945c65bec3a80aec88b5f6b239293fd2 (MD5) Previous issue date: 2013
Resumo: A estimativa do intervalo pós-morte (IPM), período entre a ocorrência da morte e o momento em que o corpo ou carcaça é encontrado, é uma das principais utilizações de insetos na área forense. A partir de informações sobre a biologia, ecologia e distribuição geográfica dos insetos, bem como do comportamento de toda fauna presente em um corpo é possível estimar o menor intervalo da ocorrência da morte. Diversos fatores tais como temperatura, umidade, presença de substâncias tóxicas nos tecidos de uma carcaça, podem interferir no ciclo de vida de um inseto, afetando diretamente a estimativa do IPM quando esta é baseada em parâmetros biológicos do inseto. Por isso, múltiplos fatores devem ser considerados para que a perícia seja mais precisa. Com o aumento no número de mortes de animais de importância econômica devido à intoxicação medicamentosa, se faz necessárias pesquisas voltadas para a entomotoxicologia, uma área que carece de estudos específicos. Assim, o presente trabalho visou identificar a entomofauna associada a carcaças de cabras (Capra aegagrus hircus L.) mortas após tratamento com ivermectina, expostas em ambiente natural, além de averiguar possíveis diferenças na atratividade, no desenvolvimento dos imaturos que utilizaram esse substrato para alimentação e se a temperatura e o padrão de colonização da massa larval divergem entre as carcaças de animais mortos por intoxicação. Esse último parâmetro foi avaliado por meio de registros termográficos realizados em intervalos de 12 horas. Além da importância de fatores abióticos como luminosidade, temperatura, umidade e pluviosidade, pôde-se observar a ação da ivermectina nas carcaças tratadas, interferindo na composição da fauna colonizadora, no tempo total e em cada estágio da decomposição, assim como no padrão físico e comportamental das massas larvais em comparação ao grupo controle. Ainda foi demonstrado que a termografia pode ser utilizada como uma nova ferramenta em estudos periciais, auxiliando de forma significativa a avaliação dos parâmetros das massas larvais
Abstract: The estimation of the postmortem interval (PMI), period between the occurrence of death and the time at which the body or casing is found, is one of the main uses of insects in the forensic field. Using information on the biology, ecology and geographical distribution of insects, as well as the behavior of the entire fauna present in a body, is possible to estimate the time of death. Several factors such as temperature, humidity, presence of toxic substances in the tissues of a carcass, may interfere with the life cycle of an insect, directly affecting the estimate of PMI when it is based on biological parameters of the insect. Therefore, multiple factors should be considered so that the forensic analysis is more accurate. With the increase in the number of animal's deaths of economic importance due to drug intoxication, becomes necessary a research on entomotoxicology, an area with lack of specific studies. Thus, the present study aimed to identify the insect fauna associated with carcasses of goats (Capra aegagrus hircus L.) killed after treatment with ivermectin and exposed in the natural environment. Still, investigate possible differences in attractiveness, the immature development that used this substrate for feeding and if the temperature and the colonization pattern of larval mass differ between carcasses of animals killed after ivermectin inoculation. This last parameter was evaluated by thermographic shots performed at intervals of 12 hours. Besides the importance of abiotic factors such as luminosity, temperature, humidity and rainfall, the action of ivermectin on carcasses couse interferense in the composition of the colonizing fauna, the total time of colonization and the time of the decomposition stages, as well as the physical patterns and behavior of larval masses compared to the control group. Although it has been shown that thermography can be used as a new tool in forensic studies, helping to evaluate the parameters of larval mass
Mestrado
Parasitologia
Mestre em Parasitologia
Andersson, Roland. "Utvinning av data ur mobiltelefoner : En valideringsstudie av forensiska verktyg." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31556.
Full textThe scientific aspect in most forensic disciplines is well founded and examined under a long-term perspective. The increasing use of digital technology has enabled a new forensic discipline and the scientific basis of the digital forensic field is in many respects still unexplored. The Swedish legal system requires that the forensic methods used in a criminal investigation should be quality assured and in the largest extent be accredited by an accreditation body. There are few relevant studies on the validation of forensic methods that handle small scale devices such as smartphones. This report analyzes the methods used to extract data from a mobile phone and how these methods can be considered forensically sound. The report presents a new framework for validating the methods used by a forensic tool. The framework is quality assured by referring to previous scientific studies and practically tested in a laboratory environment. The framework can be used directly in a forensic organization that requires validation.
Pais, Rosa Maria da Silva Dias. "Aplicação das ciências forenses no ensino secundário: um conjunto de actividades para a disciplina de Física e Química A." Master's thesis, Universidade de Évora, 2009. http://hdl.handle.net/10174/18526.
Full textSingh, Avinash. "A Digital Forensic Readiness Approach for Ransomware Forensics." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/75610.
Full textDissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc (Computer Science)
Unrestricted
Bade, Hans, and Oscar Hedlund. "Anti-Forensik : Anti-forensiska metoder på mobila enheter." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701.
Full textMobile phones have become essential for the extraction of digital artifacts in foren-sic investigations. Android’s Linux-based operating systems bring greater potentialfor anti-forensic methods, which means that knowledge of anti-forensics is essen-tial to today’s IT forensic investigators. In this study, the effect of anti-forensicson Android-based mobile devices is highlighted, as well as revealing today’s anti-forensic attack methods against forensic tools. By experiment, it is shown how toprevent a forensic tool from extracting data by using a simple script.
Silva, Alexandre Alberto Gonçalves da. "A perícia forense no Brasil." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-11082010-152328/.
Full textThis work presents a look at the forensic activity starting in ancient Egypt, the cradle of Western civilization, through the Portuguese colonization and their influence, until getting to Brazil nowadays, with the aim to bring the characteristic elements of interdisciplinary expertise in every historical period. Given its interdisciplinary character, this essay attempts to point which legislative bases had experts to carry out their activities. The aim was to identify the elements which analyzed the problems that have arisen over time to the exercise of skill as an activity assistant, as well as to highlight areas that may assist the improvement of the activity for forensics, judges and parties, as well as the final result of his work: the expert report.
Howard, Sean David. "Customization and automation in the future of digital forensics live OS forensics with FENIX (forensic examiner unix) /." [Ames, Iowa : Iowa State University], 2007.
Find full textTagesson, Samuel. "Anti-forensik mot minnesforensik : En litteraturstudie om anti-forensiska metoder mot minnesdumpning och minnesanalys." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17818.
Full textIT forensics face many difficulties in their work of obtaining and analyzing data. Criminals are using more and more anti-forensic methods to hide evidence that can be used against them. One common anti-forensic method is encryption. In order for IT forensics to access the encrypted information, the encryption key can be found in the memory of the computer. This makes the computer's memory valuable to retrieved and analyze. However, there are several anti-forensic methods that a criminal can use to prevent the memory from being retrieved or analyzed. This study performs a systematic literature study to identify the current anti-forensic methods against memory analysis and memory dumping on Windows system. Several methods are addressed where, among other things, the operating system is modified or built-in security functions on the CPU are used to prevent information being retrieved or analyzed from memory.
Marziale, Lodovico. "Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.
Full textBooks on the topic "Forensis"
Anselm, Franke, Weizman Eyal, and Haus der Kulturen der Welt, eds. Forensis: The architecture of public truth. Berlin: Sternberg Press, 2014.
Find full textLeeuwen, Simon van. Part I, book V of Censura forensis: Theoretico-practica. 4th ed. Pretoria: Published by the Govt. Printer on behalf of the South African Law Commission, 1991.
Find full textLo spettacolo della giustizia: Le orazioni di Cicerone. Palermo: Flaccovio, 2006.
Find full textMuda, Azah Kamilah, Yun-Huoy Choo, Ajith Abraham, and Sargur N. Srihari, eds. Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05885-6.
Full textHamline University. Advanced Legal Education., ed. Forensics on trial: Forensic science in the courtroom, August 4, 1988. St. Paul, MN: Advanced Legal Education, Hamline University School of Law, 1988.
Find full textWindows registry forensics: Advanced digital forensic analysis of the Windows registry. Burlington, MA: Syngress, 2011.
Find full textGregory, Kipper, and ScienceDirect (Online service), eds. Virtualization and forensics: A digital forensic investigator's guide to virtual environments. Amsterdam: Syngress/Elsevier, 2010.
Find full text1939-, Murphy Brian, and Morrison Robert D, eds. Introduction to environmental forensics. 2nd ed. Amsterdam: Academic Press, 2007.
Find full text1939-, Murphy Brian, and Morrison Robert D, eds. Introduction to environmental forensics. San Diego, Calif: Academic, 2002.
Find full textJ, Sullivan Patrick. Practical environmental forensics: Process and case histories. New York: John Wiley, 2001.
Find full textBook chapters on the topic "Forensis"
Mrdovic, Sasa. "IoT Forensics." In Security of Ubiquitous Computing Systems, 215–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_13.
Full textNordvik, Rune. "Ext4." In Mobile Forensics – The File Format Handbook, 41–68. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_2.
Full textStamm, Matthew C., and Xinwei Zhao. "Anti-Forensic Attacks Using Generative Adversarial Networks." In Multimedia Forensics, 467–90. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_17.
Full textPiva, Alessandro, and Massimo Iuliani. "Integrity Verification Through File Container Analysis." In Multimedia Forensics, 363–87. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_14.
Full textHummert, Christian, and Georgina Louise Humphries. "Property Lists." In Mobile Forensics – The File Format Handbook, 157–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_6.
Full textMahmood, Wakas, Hamid Jahankhani, and Aykut Ozkaya. "Cloud Forensics Challenges Faced by Forensic Investigators." In Communications in Computer and Information Science, 74–82. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23276-8_7.
Full textVella, Mark, and Christian Colombo. "D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage." In ICT Systems Security and Privacy Protection, 161–78. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8_10.
Full textHouck, Max M. "Front-End Forensics: An Integrated Forensic Intelligence Model." In Advanced Sciences and Technologies for Security Applications, 161–80. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41287-6_8.
Full textDija, S., T. R. Deepthi, C. Balan, and K. L. Thomas. "Towards Retrieving Live Forensic Artifacts in Offline Forensics." In Communications in Computer and Information Science, 225–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34135-9_23.
Full textKoppl, Roger G. "Romancing Forensics: Legal Failure in Forensic Science Administration." In The Pursuit of Justice, 51–70. New York: Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230109490_4.
Full textConference papers on the topic "Forensis"
Peisert, Sean, Matt Bishop, and Keith Marzullo. "Computer Forensics in Forensis." In 2008 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2008. http://dx.doi.org/10.1109/sadfe.2008.18.
Full textYan Ng, Tsz, and Wes McGee. "Public Domesticity - Digital Fabrication and Design-Build in Detroit." In 2018 ACSA International Conference. ACSA Press, 2018. http://dx.doi.org/10.35483/acsa.intl.2018.8.
Full textMoch, Christian, and Felix C. Freiling. "The Forensic Image Generator Generator (Forensig2)." In 2009 Fifth International Conference on IT Security Incident Management and IT Forensics. IEEE, 2009. http://dx.doi.org/10.1109/imf.2009.8.
Full textPunjabi, Sunil K., and Suvarna Chaure. "Forensic Intelligence- Combining Artificial Intelligence with Digital Forensics." In 2022 International Conference on Intelligent Technologies (CONIT). IEEE, 2022. http://dx.doi.org/10.1109/conit55038.2022.9848406.
Full textGuilhen, Bruno Anselmo, Regina Melo Silveira, and Sergio Takeo Kofuji. "Computação Forense em Redes Definidas por Software (SDN): Uma revisão de literatura." In Workshop de Pesquisa Experimental da Internet do Futuro. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/wpeif.2021.17195.
Full textKiltz, Stefan, Jana Dittmann, and Claus Vielhauer. "Supporting Forensic Design - A Course Profile to Teach Forensics." In 2015 Ninth International Conference on IT Security Incident Management & IT Forensics (IMF). IEEE, 2015. http://dx.doi.org/10.1109/imf.2015.16.
Full textMumba, Emilio Raymond, and H. S. Venter. "Mobile forensics using the harmonised digital forensic investigation process." In 2014 Information Security for South Africa (ISSA). IEEE, 2014. http://dx.doi.org/10.1109/issa.2014.6950491.
Full textMcKay, Christine, Ashwin Swaminathan, Hongmei Gou, and Min Wu. "Image acquisition forensics: Forensic analysis to identify imaging source." In ICASSP 2008 - 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2008. http://dx.doi.org/10.1109/icassp.2008.4517945.
Full textHankins, Ryan, Tetsutaroh Uehara, and Jigang Liu. "A Comparative Study of Forensic Science and Computer Forensics." In 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI). IEEE, 2009. http://dx.doi.org/10.1109/ssiri.2009.42.
Full textReeva, Patel, Dhuri Siddhesh, Gada Preet, Shah Pratik, and Nilakshi Jain. "Digital Forensics Capability Analyzer: A tool to check forensic capability." In 2019 International Conference on Nascent Technologies in Engineering (ICNTE). IEEE, 2019. http://dx.doi.org/10.1109/icnte44896.2019.8945960.
Full textReports on the topic "Forensis"
Rodriguez, Michelle M., and Jeffrey L. Duffany. Introduction to Forensics and the Use of the Helix Free Forensic Tool. Fort Belvoir, VA: Defense Technical Information Center, January 2012. http://dx.doi.org/10.21236/ada582973.
Full textHopcroft, John E. Information Forensics. Fort Belvoir, VA: Defense Technical Information Center, February 2010. http://dx.doi.org/10.21236/ada562577.
Full textCassata, W., N. Gharibyan, B. Isselhardt, J. Matzel, and T. Parsons-Davis. Nuclear Forensics. Office of Scientific and Technical Information (OSTI), April 2022. http://dx.doi.org/10.2172/1866160.
Full textMatey, James. Forensic Iris:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2226.
Full textNg, B. M., and N. C. Perry. National Security Forensics. Office of Scientific and Technical Information (OSTI), October 2011. http://dx.doi.org/10.2172/1114703.
Full textScott, Mark R. Nuclear Reactor Forensics. Office of Scientific and Technical Information (OSTI), July 2013. http://dx.doi.org/10.2172/1087613.
Full textAyers, Rick, and Wayne Jansen. PDA forensic tools :. Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7100.
Full textSimpson, William R., and Coimbatore Chandersekaran. Cloud Forensics Issues. Fort Belvoir, VA: Defense Technical Information Center, July 2014. http://dx.doi.org/10.21236/ada604902.
Full textBeebe, Merilyn Amy. Nuclear forensics: Soil content. Office of Scientific and Technical Information (OSTI), August 2015. http://dx.doi.org/10.2172/1213518.
Full textRundberg, Robert S. Post-detonation Nuclear Forensics. Office of Scientific and Technical Information (OSTI), May 2013. http://dx.doi.org/10.2172/1078366.
Full text