Littérature scientifique sur le sujet « Forensis »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Forensis ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Forensis"
Peisert, Sean, Matt Bishop et Keith Marzullo. « Computer forensics in forensis ». ACM SIGOPS Operating Systems Review 42, no 3 (avril 2008) : 112–22. http://dx.doi.org/10.1145/1368506.1368521.
Texte intégralKirn, Gal, et Niloufar Tajeri. « The Age of Forensics : Memory, Emancipatory Politics or Visual Strategy ? Interview with Eyal Weizman and Anselm Franke ». Maska 31, no 177 (1 juin 2016) : 14–35. http://dx.doi.org/10.1386/maska.31.177-178.14_7.
Texte intégralMitas, Stergios. « Crimen publicum, poena forensis ». Archiv fuer Rechts- und Sozialphilosophie 106, no 4 (2020) : 554. http://dx.doi.org/10.25162/arsp-2020-0027.
Texte intégralФиляк, Петр Юрьевич, Сергей Владимирович Королев et Никита Владимирович Тебеньков. « ENSURING THE INFORMATION SECURITY WITH THE USE OF TOOLS OF FORENSICS ». ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no 4(-) (15 décembre 2021) : 571–80. http://dx.doi.org/10.36622/vstu.2021.24.4.009.
Texte intégralApter, Emily. « Shibboleth : Policing by Ear and Forensic Listening in Projects by Lawrence Abu Hamdan ». October 156 (mai 2016) : 100–115. http://dx.doi.org/10.1162/octo_a_00253.
Texte intégralSlipets, O. « THEORETICAL ASPECTS OF FORENSIS-PSYCHOLOGICAL EXAMINATION OF TYPOLOGICAL FEATURES OF PERSONALITY ». Theory and Practice of Forensic Science and Criminalistics 20, no 2 (4 décembre 2019) : 505–21. http://dx.doi.org/10.32353/khrife.2.2019.40.
Texte intégralRothwell, Gar W. « BOTRYOPTERIS FORENSIS (BOTRYOPTERIDACEAE), A TRUNK EPIPHYTE OF THE TREE FERN PSARONIUS ». American Journal of Botany 78, no 6 (juin 1991) : 782–88. http://dx.doi.org/10.1002/j.1537-2197.1991.tb14479.x.
Texte intégralMazo Gómez, Wilson De Jesús. « La tradición católica, su influencia en la conformación del rol de la mujer en la familia tradicional colombiana y su relación con la violencia de pareja al interior de ésta ». Ratio Juris 14, no 28 (17 octobre 2019) : 219–52. http://dx.doi.org/10.24142/raju.v14n28a8.
Texte intégralMualfah, Desti, et Rizdqi Akbar Ramadhan. « Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital ». Digital Zone : Jurnal Teknologi Informasi dan Komunikasi 11, no 2 (7 novembre 2020) : 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Texte intégralHarrison, S. J. « The Speaking Book : The Prologue to Apuleius' Metamorphoses ». Classical Quarterly 40, no 2 (décembre 1990) : 507–13. http://dx.doi.org/10.1017/s000983880004307x.
Texte intégralThèses sur le sujet "Forensis"
Cembalo, Maurizio. « Forensic analysis for digital images ». Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/227.
Texte intégralNowadays, taking and sharing digital pictures is becoming a very popular activity. This is witnessed by the explosive growth of the digital cameras market: e.g., more than one billion of digital cameras have been produced and shipped in 2010. A consequence of this trend is that also the number of crimes involving digital pictures increases, either because pictures are part of the crime (e.g., exchanging pedopornographic pictures) or because their analysis may reveal some important clue about the author of the crime. The highly technical nature of computer crimes facilitated a wholly new branch of forensic science called digital forensics. The Digital Forensic Sci- ence involves processes such as acquisition of data from an electronic source, analysis of the acquired data, extraction of evidence from the data, and the preservation and presentation of the evidence. Digital Imaging Forensics is a specialization of the Digital Forensics which deals with digital images. One of the many issues that the Digital Imaging Forensics tries to deal with is the source camera identi cation problem, i.e., establish if a given image has been taken by a given digital camera. Today this is a practical and important problem aiming to identify reliably the imaging device that acquired a particular digital image. Techniques to authenticate an electronic image are especially important in court. For example, identifying the source device could establish the origin of images presented as evidence. In a prosecution for child pornography, for example, it could be desirable that one could prove that certain imagery was obtained with a speci c camera and is thus not an image generated by a computer, given that "virutal images" are not considered offense. As electronic images and digital video replace their analog counterparts, the importance of reliable, inexpensive, and fast identification of the origin of a particular image will increase. The identification of a source camera of an image is a complex issue which requires the understanding of the several steps involved in the creation of the digital photographic representation of a real scene. In particular, it is necessary to understand how the digital images are created, which are the processes which create (and therefore affect) the creation of the digital data, starting from the real scene. Moreover, it is necessary to point out the factors which can be used to support the camera identification and, may be even more important, which are the factors which can tamper the photos and prevent (maliciously or not) the camera identification. Many identification techniques have been proposed so far in literature. All these techniques generally work by using the sensor noise (an unexpected variation of the digital signal) left by a digital sensor when taking a picture as a fingerprint for identifying the sensor. These studies are generally accompanied with tests proving the effectiveness of these techniques, both in terms of False Acceptance Rate (FAR) and False Rejection Rate (FRR). Unfortunately, most of these contributions do not take into consideration that, in practice, the images that are shared and exchanged over the Internet have often been pre-processed. Instead, it is a common practice to assume that the images to be examined are unmodified or, at most, to ignore the e ects of the pre-processing. Even without considering the case of malicious users that could intention- ally process a picture in order to fool the existing identification techniques, this assumption is unrealistic for at least two reasons. The first is that, as previously mentioned, almost all current photo-managing software o ers several functions for adjusting, sometimes in a "magic" way (see the "I'm feeling lucky" function on Google Picasa) different characteristics of a picture. The second reason can be found in the way the images are managed by some of the most important online social network (OSN) and online photo sharing (OPS) sites. These services usually make several modifications to the original photos before publishing them in order to either improve their appearance or reduce their size. In this thesis we have first implemented the most prominent source camera identification technique, proposed by Lukas et al. and based on the Photo-Response Non-Uniformity. Then, we present a new identification technique that use a SVM (Support Vector Macchine) classifier to associate photos to the right camera. Both our implementation of Lukas et al. technique and our SVM technique have been extensively tested on a test-sample of nearly 2500 images taken from 8 different cameras. The main purpose of the experiments conducted is to see how these techniques performs in presence of pre-processed images, either explicit modified by a user with photo management tools or modified by OSNs and OPSs services without user awareness. The results confirm that, in several cases, the method by Lukas et al. and our SVM technique is resilient to the modifications introduced by the considered image-processing functions. However, in the experiments it has been possible to identify several cases where the quality of the identifica- tion process was deteriorated because of the noise introduced by the image- processing. In addition, when dealing with Online Social Networks and Online Photo Sharing services, it has been noted that some of them process and modify the uploaded pictures. These modifications make ineffective, in many cases, the method by Lukas et al. while SVM technique performs slightly better. [edited by author]
2009 - 2010
Brancoli, Daniel Luz 1986. « O efeito da ivermectina na duração das fases de decomposição, sobre os insetos necrófagos e interpretação termográfica da distribuição espacial da massa larval de dípteros em carcaças de cabras (Capra aegragrus hircus L.,1758) ». [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/317460.
Texte intégralDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Biologia
Made available in DSpace on 2018-08-23T07:56:31Z (GMT). No. of bitstreams: 1 Brancoli_DanielLuz_M.pdf: 2919175 bytes, checksum: 945c65bec3a80aec88b5f6b239293fd2 (MD5) Previous issue date: 2013
Resumo: A estimativa do intervalo pós-morte (IPM), período entre a ocorrência da morte e o momento em que o corpo ou carcaça é encontrado, é uma das principais utilizações de insetos na área forense. A partir de informações sobre a biologia, ecologia e distribuição geográfica dos insetos, bem como do comportamento de toda fauna presente em um corpo é possível estimar o menor intervalo da ocorrência da morte. Diversos fatores tais como temperatura, umidade, presença de substâncias tóxicas nos tecidos de uma carcaça, podem interferir no ciclo de vida de um inseto, afetando diretamente a estimativa do IPM quando esta é baseada em parâmetros biológicos do inseto. Por isso, múltiplos fatores devem ser considerados para que a perícia seja mais precisa. Com o aumento no número de mortes de animais de importância econômica devido à intoxicação medicamentosa, se faz necessárias pesquisas voltadas para a entomotoxicologia, uma área que carece de estudos específicos. Assim, o presente trabalho visou identificar a entomofauna associada a carcaças de cabras (Capra aegagrus hircus L.) mortas após tratamento com ivermectina, expostas em ambiente natural, além de averiguar possíveis diferenças na atratividade, no desenvolvimento dos imaturos que utilizaram esse substrato para alimentação e se a temperatura e o padrão de colonização da massa larval divergem entre as carcaças de animais mortos por intoxicação. Esse último parâmetro foi avaliado por meio de registros termográficos realizados em intervalos de 12 horas. Além da importância de fatores abióticos como luminosidade, temperatura, umidade e pluviosidade, pôde-se observar a ação da ivermectina nas carcaças tratadas, interferindo na composição da fauna colonizadora, no tempo total e em cada estágio da decomposição, assim como no padrão físico e comportamental das massas larvais em comparação ao grupo controle. Ainda foi demonstrado que a termografia pode ser utilizada como uma nova ferramenta em estudos periciais, auxiliando de forma significativa a avaliação dos parâmetros das massas larvais
Abstract: The estimation of the postmortem interval (PMI), period between the occurrence of death and the time at which the body or casing is found, is one of the main uses of insects in the forensic field. Using information on the biology, ecology and geographical distribution of insects, as well as the behavior of the entire fauna present in a body, is possible to estimate the time of death. Several factors such as temperature, humidity, presence of toxic substances in the tissues of a carcass, may interfere with the life cycle of an insect, directly affecting the estimate of PMI when it is based on biological parameters of the insect. Therefore, multiple factors should be considered so that the forensic analysis is more accurate. With the increase in the number of animal's deaths of economic importance due to drug intoxication, becomes necessary a research on entomotoxicology, an area with lack of specific studies. Thus, the present study aimed to identify the insect fauna associated with carcasses of goats (Capra aegagrus hircus L.) killed after treatment with ivermectin and exposed in the natural environment. Still, investigate possible differences in attractiveness, the immature development that used this substrate for feeding and if the temperature and the colonization pattern of larval mass differ between carcasses of animals killed after ivermectin inoculation. This last parameter was evaluated by thermographic shots performed at intervals of 12 hours. Besides the importance of abiotic factors such as luminosity, temperature, humidity and rainfall, the action of ivermectin on carcasses couse interferense in the composition of the colonizing fauna, the total time of colonization and the time of the decomposition stages, as well as the physical patterns and behavior of larval masses compared to the control group. Although it has been shown that thermography can be used as a new tool in forensic studies, helping to evaluate the parameters of larval mass
Mestrado
Parasitologia
Mestre em Parasitologia
Andersson, Roland. « Utvinning av data ur mobiltelefoner : En valideringsstudie av forensiska verktyg ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31556.
Texte intégralThe scientific aspect in most forensic disciplines is well founded and examined under a long-term perspective. The increasing use of digital technology has enabled a new forensic discipline and the scientific basis of the digital forensic field is in many respects still unexplored. The Swedish legal system requires that the forensic methods used in a criminal investigation should be quality assured and in the largest extent be accredited by an accreditation body. There are few relevant studies on the validation of forensic methods that handle small scale devices such as smartphones. This report analyzes the methods used to extract data from a mobile phone and how these methods can be considered forensically sound. The report presents a new framework for validating the methods used by a forensic tool. The framework is quality assured by referring to previous scientific studies and practically tested in a laboratory environment. The framework can be used directly in a forensic organization that requires validation.
Pais, Rosa Maria da Silva Dias. « Aplicação das ciências forenses no ensino secundário : um conjunto de actividades para a disciplina de Física e Química A ». Master's thesis, Universidade de Évora, 2009. http://hdl.handle.net/10174/18526.
Texte intégralSingh, Avinash. « A Digital Forensic Readiness Approach for Ransomware Forensics ». Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/75610.
Texte intégralDissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc (Computer Science)
Unrestricted
Bade, Hans, et Oscar Hedlund. « Anti-Forensik : Anti-forensiska metoder på mobila enheter ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37701.
Texte intégralMobile phones have become essential for the extraction of digital artifacts in foren-sic investigations. Android’s Linux-based operating systems bring greater potentialfor anti-forensic methods, which means that knowledge of anti-forensics is essen-tial to today’s IT forensic investigators. In this study, the effect of anti-forensicson Android-based mobile devices is highlighted, as well as revealing today’s anti-forensic attack methods against forensic tools. By experiment, it is shown how toprevent a forensic tool from extracting data by using a simple script.
Silva, Alexandre Alberto Gonçalves da. « A perícia forense no Brasil ». Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-11082010-152328/.
Texte intégralThis work presents a look at the forensic activity starting in ancient Egypt, the cradle of Western civilization, through the Portuguese colonization and their influence, until getting to Brazil nowadays, with the aim to bring the characteristic elements of interdisciplinary expertise in every historical period. Given its interdisciplinary character, this essay attempts to point which legislative bases had experts to carry out their activities. The aim was to identify the elements which analyzed the problems that have arisen over time to the exercise of skill as an activity assistant, as well as to highlight areas that may assist the improvement of the activity for forensics, judges and parties, as well as the final result of his work: the expert report.
Howard, Sean David. « Customization and automation in the future of digital forensics live OS forensics with FENIX (forensic examiner unix) / ». [Ames, Iowa : Iowa State University], 2007.
Trouver le texte intégralTagesson, Samuel. « Anti-forensik mot minnesforensik : En litteraturstudie om anti-forensiska metoder mot minnesdumpning och minnesanalys ». Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17818.
Texte intégralIT forensics face many difficulties in their work of obtaining and analyzing data. Criminals are using more and more anti-forensic methods to hide evidence that can be used against them. One common anti-forensic method is encryption. In order for IT forensics to access the encrypted information, the encryption key can be found in the memory of the computer. This makes the computer's memory valuable to retrieved and analyze. However, there are several anti-forensic methods that a criminal can use to prevent the memory from being retrieved or analyzed. This study performs a systematic literature study to identify the current anti-forensic methods against memory analysis and memory dumping on Windows system. Several methods are addressed where, among other things, the operating system is modified or built-in security functions on the CPU are used to prevent information being retrieved or analyzed from memory.
Marziale, Lodovico. « Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations ». ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.
Texte intégralLivres sur le sujet "Forensis"
Anselm, Franke, Weizman Eyal et Haus der Kulturen der Welt, dir. Forensis : The architecture of public truth. Berlin : Sternberg Press, 2014.
Trouver le texte intégralLeeuwen, Simon van. Part I, book V of Censura forensis : Theoretico-practica. 4e éd. Pretoria : Published by the Govt. Printer on behalf of the South African Law Commission, 1991.
Trouver le texte intégralLo spettacolo della giustizia : Le orazioni di Cicerone. Palermo : Flaccovio, 2006.
Trouver le texte intégralMuda, Azah Kamilah, Yun-Huoy Choo, Ajith Abraham et Sargur N. Srihari, dir. Computational Intelligence in Digital Forensics : Forensic Investigation and Applications. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05885-6.
Texte intégralHamline University. Advanced Legal Education., dir. Forensics on trial : Forensic science in the courtroom, August 4, 1988. St. Paul, MN : Advanced Legal Education, Hamline University School of Law, 1988.
Trouver le texte intégralWindows registry forensics : Advanced digital forensic analysis of the Windows registry. Burlington, MA : Syngress, 2011.
Trouver le texte intégralGregory, Kipper, et ScienceDirect (Online service), dir. Virtualization and forensics : A digital forensic investigator's guide to virtual environments. Amsterdam : Syngress/Elsevier, 2010.
Trouver le texte intégral1939-, Murphy Brian, et Morrison Robert D, dir. Introduction to environmental forensics. 2e éd. Amsterdam : Academic Press, 2007.
Trouver le texte intégral1939-, Murphy Brian, et Morrison Robert D, dir. Introduction to environmental forensics. San Diego, Calif : Academic, 2002.
Trouver le texte intégralJ, Sullivan Patrick. Practical environmental forensics : Process and case histories. New York : John Wiley, 2001.
Trouver le texte intégralChapitres de livres sur le sujet "Forensis"
Mrdovic, Sasa. « IoT Forensics ». Dans Security of Ubiquitous Computing Systems, 215–29. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_13.
Texte intégralNordvik, Rune. « Ext4 ». Dans Mobile Forensics – The File Format Handbook, 41–68. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_2.
Texte intégralStamm, Matthew C., et Xinwei Zhao. « Anti-Forensic Attacks Using Generative Adversarial Networks ». Dans Multimedia Forensics, 467–90. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_17.
Texte intégralPiva, Alessandro, et Massimo Iuliani. « Integrity Verification Through File Container Analysis ». Dans Multimedia Forensics, 363–87. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_14.
Texte intégralHummert, Christian, et Georgina Louise Humphries. « Property Lists ». Dans Mobile Forensics – The File Format Handbook, 157–65. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_6.
Texte intégralMahmood, Wakas, Hamid Jahankhani et Aykut Ozkaya. « Cloud Forensics Challenges Faced by Forensic Investigators ». Dans Communications in Computer and Information Science, 74–82. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23276-8_7.
Texte intégralVella, Mark, et Christian Colombo. « D-Cloud-Collector : Admissible Forensic Evidence from Mobile Cloud Storage ». Dans ICT Systems Security and Privacy Protection, 161–78. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8_10.
Texte intégralHouck, Max M. « Front-End Forensics : An Integrated Forensic Intelligence Model ». Dans Advanced Sciences and Technologies for Security Applications, 161–80. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41287-6_8.
Texte intégralDija, S., T. R. Deepthi, C. Balan et K. L. Thomas. « Towards Retrieving Live Forensic Artifacts in Offline Forensics ». Dans Communications in Computer and Information Science, 225–33. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34135-9_23.
Texte intégralKoppl, Roger G. « Romancing Forensics : Legal Failure in Forensic Science Administration ». Dans The Pursuit of Justice, 51–70. New York : Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230109490_4.
Texte intégralActes de conférences sur le sujet "Forensis"
Peisert, Sean, Matt Bishop et Keith Marzullo. « Computer Forensics in Forensis ». Dans 2008 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2008. http://dx.doi.org/10.1109/sadfe.2008.18.
Texte intégralYan Ng, Tsz, et Wes McGee. « Public Domesticity - Digital Fabrication and Design-Build in Detroit ». Dans 2018 ACSA International Conference. ACSA Press, 2018. http://dx.doi.org/10.35483/acsa.intl.2018.8.
Texte intégralMoch, Christian, et Felix C. Freiling. « The Forensic Image Generator Generator (Forensig2) ». Dans 2009 Fifth International Conference on IT Security Incident Management and IT Forensics. IEEE, 2009. http://dx.doi.org/10.1109/imf.2009.8.
Texte intégralPunjabi, Sunil K., et Suvarna Chaure. « Forensic Intelligence- Combining Artificial Intelligence with Digital Forensics ». Dans 2022 International Conference on Intelligent Technologies (CONIT). IEEE, 2022. http://dx.doi.org/10.1109/conit55038.2022.9848406.
Texte intégralGuilhen, Bruno Anselmo, Regina Melo Silveira et Sergio Takeo Kofuji. « Computação Forense em Redes Definidas por Software (SDN) : Uma revisão de literatura ». Dans Workshop de Pesquisa Experimental da Internet do Futuro. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/wpeif.2021.17195.
Texte intégralKiltz, Stefan, Jana Dittmann et Claus Vielhauer. « Supporting Forensic Design - A Course Profile to Teach Forensics ». Dans 2015 Ninth International Conference on IT Security Incident Management & IT Forensics (IMF). IEEE, 2015. http://dx.doi.org/10.1109/imf.2015.16.
Texte intégralMumba, Emilio Raymond, et H. S. Venter. « Mobile forensics using the harmonised digital forensic investigation process ». Dans 2014 Information Security for South Africa (ISSA). IEEE, 2014. http://dx.doi.org/10.1109/issa.2014.6950491.
Texte intégralMcKay, Christine, Ashwin Swaminathan, Hongmei Gou et Min Wu. « Image acquisition forensics : Forensic analysis to identify imaging source ». Dans ICASSP 2008 - 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2008. http://dx.doi.org/10.1109/icassp.2008.4517945.
Texte intégralHankins, Ryan, Tetsutaroh Uehara et Jigang Liu. « A Comparative Study of Forensic Science and Computer Forensics ». Dans 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI). IEEE, 2009. http://dx.doi.org/10.1109/ssiri.2009.42.
Texte intégralReeva, Patel, Dhuri Siddhesh, Gada Preet, Shah Pratik et Nilakshi Jain. « Digital Forensics Capability Analyzer : A tool to check forensic capability ». Dans 2019 International Conference on Nascent Technologies in Engineering (ICNTE). IEEE, 2019. http://dx.doi.org/10.1109/icnte44896.2019.8945960.
Texte intégralRapports d'organisations sur le sujet "Forensis"
Rodriguez, Michelle M., et Jeffrey L. Duffany. Introduction to Forensics and the Use of the Helix Free Forensic Tool. Fort Belvoir, VA : Defense Technical Information Center, janvier 2012. http://dx.doi.org/10.21236/ada582973.
Texte intégralHopcroft, John E. Information Forensics. Fort Belvoir, VA : Defense Technical Information Center, février 2010. http://dx.doi.org/10.21236/ada562577.
Texte intégralCassata, W., N. Gharibyan, B. Isselhardt, J. Matzel et T. Parsons-Davis. Nuclear Forensics. Office of Scientific and Technical Information (OSTI), avril 2022. http://dx.doi.org/10.2172/1866160.
Texte intégralMatey, James. Forensic Iris :. Gaithersburg, MD : National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2226.
Texte intégralNg, B. M., et N. C. Perry. National Security Forensics. Office of Scientific and Technical Information (OSTI), octobre 2011. http://dx.doi.org/10.2172/1114703.
Texte intégralScott, Mark R. Nuclear Reactor Forensics. Office of Scientific and Technical Information (OSTI), juillet 2013. http://dx.doi.org/10.2172/1087613.
Texte intégralAyers, Rick, et Wayne Jansen. PDA forensic tools :. Gaithersburg, MD : National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7100.
Texte intégralSimpson, William R., et Coimbatore Chandersekaran. Cloud Forensics Issues. Fort Belvoir, VA : Defense Technical Information Center, juillet 2014. http://dx.doi.org/10.21236/ada604902.
Texte intégralBeebe, Merilyn Amy. Nuclear forensics : Soil content. Office of Scientific and Technical Information (OSTI), août 2015. http://dx.doi.org/10.2172/1213518.
Texte intégralRundberg, Robert S. Post-detonation Nuclear Forensics. Office of Scientific and Technical Information (OSTI), mai 2013. http://dx.doi.org/10.2172/1078366.
Texte intégral