期刊文献+
共找到714篇文章
< 1 2 36 >
每页显示 20 50 100
Factors affecting forensic electric network frequency matching-A comprehensive study
1
作者 Guang Hua Qingyi Wang +3 位作者 Dengpan Ye Haijian Zhang Guoyin Wang Shuyin Xia 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1121-1130,共10页
The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)... The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)criterion,enabled by the properties of random fluctuations and intra-grid consistency.In essence,this is a task of matching a short random sequence within a long reference,whose accuracy is mainly concerned with whether this match could be uniquely correct.In this paper,we comprehensively analyze the factors affecting the reliability of ENF matching,including the length of test recording,length of reference,temporal resolution,and Signal-to-Noise Ratio(SNR).For synthetic analysis,we incorporate the first-order AutoRegressive(AR)ENF model and propose an efficient Time-Frequency Domain noisy ENF synthesis method.Then,the reliability analysis schemes for both synthetic and real-world data are respectively proposed.Through a comprehensive study,we quantitatively reveal that while the SNR is an important external factor to determine whether timestamp verification is viable,the length of test recording is the most important inherent factor,followed by the length of reference.However,the temporal resolution has little impact on performance.Finally,a practical workflow of the ENF-based audio timestamp verification system is proposed,incorporating the discovered results. 展开更多
关键词 Digital forensics Audio forensics Data authentication Timestamp verification Electric network frequency criterion
下载PDF
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics
2
作者 Juhwan Kim Baehoon Son +1 位作者 Jihyeon Yu Joobeom Yun 《Computers, Materials & Continua》 SCIE EI 2024年第11期3371-3393,共23页
Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the comp... Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised systems.Forensic analysts are tasked with extracting and subsequently analyzing data,termed as artifacts,from these systems to gather evidence.Therefore,forensic analysts must sift through extensive datasets to isolate pertinent evidence.However,manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive.Previous studies addressed such inefficiencies by integrating artificial intelligence(AI)technologies into digital forensics.Despite the efforts in previous studies,artifacts were analyzed without considering the nature of the data within them and failed to prove their efficiency through specific evaluations.In this study,we propose a system to prioritize suspicious artifacts from compromised systems infected with malware to facilitate efficient digital forensics.Our system introduces a double-checking method that recognizes the nature of data within target artifacts and employs algorithms ideal for anomaly detection.The key ideas of this method are:(1)prioritize suspicious artifacts and filter remaining artifacts using autoencoder and(2)further prioritize suspicious artifacts and filter remaining artifacts using logarithmic entropy.Our evaluation demonstrates that our system can identify malicious artifacts with high accuracy and that its double-checking method is more efficient than alternative approaches.Our system can significantly reduce the time required for forensic analysis and serve as a reference for future studies. 展开更多
关键词 Digital forensics autoencoder logarithmic entropy PRIORITIZATION anomaly detection windows artifacts artificial intelligence
下载PDF
An Adaptive Hate Speech Detection Approach Using Neutrosophic Neural Networks for Social Media Forensics
3
作者 Yasmine M.Ibrahim Reem Essameldin Saad M.Darwish 《Computers, Materials & Continua》 SCIE EI 2024年第4期243-262,共20页
Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hate... Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hatespeech, but they still suffer from ambiguity when differentiating between hateful and offensive content and theyalso lack accuracy. The work suggested in this paper uses a combination of the Whale Optimization Algorithm(WOA) and Particle Swarm Optimization (PSO) to adjust the weights of two Multi-Layer Perceptron (MLPs)for neutrosophic sets classification. During the training process of the MLP, the WOA is employed to exploreand determine the optimal set of weights. The PSO algorithm adjusts the weights to optimize the performanceof the MLP as fine-tuning. Additionally, in this approach, two separate MLP models are employed. One MLPis dedicated to predicting degrees of truth membership, while the other MLP focuses on predicting degrees offalse membership. The difference between these memberships quantifies uncertainty, indicating the degree ofindeterminacy in predictions. The experimental results indicate the superior performance of our model comparedto previous work when evaluated on the Davidson dataset. 展开更多
关键词 Hate speech detection whale optimization neutrosophic sets social media forensics
下载PDF
Evaluation of a Novel 32 X-STR Loci Multiplex System in the Forensic Application
4
作者 ZHANG Juntao YANG Xingyi +5 位作者 YU Zhengliang ZHAO Peng LIU Dayu HAN Xiaolong SUN Hongyu LIU Chao 《刑事技术》 2024年第5期456-463,共8页
The AGCU X Plus STR system is a newly developed multiplex PCR kit that detects 32 X-chromosomal STR loci simultaneously.These are DXS6807,DXS9895,linkage group 1(DXS10148,DXS10135,DXS8378),DXS9902,DXS6795,DXS6810,DXS1... The AGCU X Plus STR system is a newly developed multiplex PCR kit that detects 32 X-chromosomal STR loci simultaneously.These are DXS6807,DXS9895,linkage group 1(DXS10148,DXS10135,DXS8378),DXS9902,DXS6795,DXS6810,DXS10159,DXS10162,DXS10164,DXS7132,linkage group 2(DXS10079,DXS10074,DXS10075),DXS981,DXS6800,DXS6803,DXS6809,DXS6789,DXS7424,DXS101,DXS7133,GATA172D05,GATA165B12,linkage group 3(DXS10103,HPRTB,DXS10101),GATA31E08 and linkage group 4(DXS8377,DXS10134,DXS7423).A major advantage of this kit is that it takes into account linkage between loci,in addition to detecting more X-STR loci.In order to evaluate the forensic application of 32 X-STR fl uorescence amplifi cation system,PCR settings,sensitivity,species specifi city,stability,DNA mixtures,concordance,stutter,sizing precision,and population genetics investigation were evaluated according to the Scientific Working Group on DNA Analysis Methods(SWGDAM)developmental validation guidelines.The study showed that the genotyping results of each locus were signifi cantly accurate when the DNA template was at least 62.5 pg.Complete profi les were obtained for the 1∶1 and 1∶3 combinations.A total of 209 unrelated individuals from Southern Chinese Han community,consisting of 84 females and 125 males,were selected for population studies,and 285 allele profi les were detected from 32 X-STR loci.The polymorphism information content(PIC)ranged from 0.2721 in DXS6800,to 0.9105 in DXS10135,with an average of 0.6798.DXS10135(PIC=0.9105)was the most polymorphic locus,with discrimination power(DP)of 0.9164 and 0.9871 for the male and female.The cumulative PD_(F),PD_(M),MEC_(trio) and MEC_(duo) valu es were all greater than 0.999999999.There were 78 different DXS10103-HPRTB-DXS10101 haplotypes among the 125 males,and the haplotype diversity was 0.9810.There was no signifi cant difference in the cumulative PD_(F),PD_(M),MEC_(trio) and MEC_(duo) values whether considering linkage or not.In summary,the new X-STR multiplex typing system is effective and reliable,which can be useful in human genetic analysis and kinship testing as a potent complement to autosomal STR typing. 展开更多
关键词 forensic genetics X-STR loci kinship analysis EVALUATION
下载PDF
CVIP-Net: A Convolutional Neural Network-Based Model for Forensic Radiology Image Classification
5
作者 Syeda Naila Batool Ghulam Gilanie 《Computers, Materials & Continua》 SCIE EI 2023年第1期1319-1332,共14页
Automated and autonomous decisions of image classification systems have essential applicability in this modern age even.Image-based decisions are commonly taken through explicit or auto-feature engineering of images.I... Automated and autonomous decisions of image classification systems have essential applicability in this modern age even.Image-based decisions are commonly taken through explicit or auto-feature engineering of images.In forensic radiology,auto decisions based on images significantly affect the automation of various tasks.This study aims to assist forensic radiology in its biological profile estimation when only bones are left.A benchmarked dataset Radiology Society of North America(RSNA)has been used for research and experiments.Additionally,a locally developed dataset has also been used for research and experiments to cross-validate the results.A Convolutional Neural Network(CNN)-based model named computer vision and image processing-net(CVIP-Net)has been proposed to learn and classify image features.Experiments have also been performed on state-of-the-art pertained models,which are alex_net,inceptionv_3,google_net,Residual Network(resnet)_50,and Visual Geometry Group(VGG)-19.Experiments proved that the proposed CNN model is more accurate than other models when panoramic dental x-ray images are used to identify age and gender.The specially designed CNN-based achieved results in terms of standard evaluation measures including accuracy(98.90%),specificity(97.99%),sensitivity(99.34%),and Area under the Curve(AUC)-value(0.99)on the locally developed dataset to detect age.The classification rates of the proposed model for gender estimation were 99.57%,97.67%,98.99%,and 0.98,achieved in terms of accuracy,specificity,sensitivity,and AUC-value,respectively,on the local dataset.The classification rates of the proposed model for age estimation were 96.80%,96.80%,97.03%,and 0.99 achieved in terms of accuracy,specificity,sensitivity,and AUC-value,respectively,on the RSNA dataset. 展开更多
关键词 Bones forensic analysis forensic radiology biology profile estimation age&gender estimation using dental x-ray images
下载PDF
Hyper-Tuned Convolutional Neural Networks for Authorship Verification in Digital Forensic Investigations 被引量:1
6
作者 Asif Rahim Yanru Zhong +2 位作者 Tariq Ahmad Sadique Ahmad Mohammed A.ElAffendi 《Computers, Materials & Continua》 SCIE EI 2023年第8期1947-1976,共30页
Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of text.Convolutional Neural Networks(CNNs)h... Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of text.Convolutional Neural Networks(CNNs)have shown promise in solving this problem,but their performance highly depends on the choice of hyperparameters.In this paper,we explore the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification.We conduct experiments using a Hyper Tuned CNN model with three popular optimization algorithms:Adaptive Moment Estimation(ADAM),StochasticGradientDescent(SGD),andRoot Mean Squared Propagation(RMSPROP).The model is trained and tested on a dataset of text samples collected from various authors,and the performance is evaluated using accuracy,precision,recall,and F1 score.We compare the performance of the three optimization algorithms and demonstrate the effectiveness of hyperparameter tuning in improving the accuracy of the CNN model.Our results show that the Hyper Tuned CNN model with ADAM Optimizer achieves the highest accuracy of up to 90%.Furthermore,we demonstrate that hyperparameter tuning can help achieve significant performance improvements,even using a relatively simple model architecture like CNNs.Our findings suggest that the choice of the optimization algorithm is a crucial factor in the performance of CNNs for authorship verification and that hyperparameter tuning can be an effective way to optimize this choice.Overall,this paper demonstrates the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification in digital forensic investigations.Our findings have important implications for developing accurate and reliable authorship verification systems,which are crucial for various applications in digital forensics,such as identifying the author of anonymous threatening messages or detecting cases of plagiarism. 展开更多
关键词 Convolutional Neural Network(CNN) hyper-tuning authorship verification digital forensics
下载PDF
Forensic Study on Objective Evaluation of Visual Acuity of Ametropia with the Event-related Potential P3
7
作者 Fu-quan JIA Fang-liang LUO +3 位作者 Yan-he XIONG Long-long CHENG Zhi-qiang DANG Ji-hui LIU 《Current Medical Science》 SCIE CAS 2023年第3期609-614,共6页
Objective In this study,we aimed to assess the characteristics of the P3 component from an event-related potential(ERP)that was induced by visual acuity(VA)processing.Furthermore,we sought to provide electrophysiologi... Objective In this study,we aimed to assess the characteristics of the P3 component from an event-related potential(ERP)that was induced by visual acuity(VA)processing.Furthermore,we sought to provide electrophysiological evidence for the objective evaluation of VA.Methods We recruited 32 participants with myopia-related ametropia.They reported no other ocular diseases and had an uncorrected VA of 4.0 in both eyes.We used the block letter“E”at different visual angles and orientations as the graphic stimuli.The oddball paradigm,consisting of 4 modules,was used for ERP analysis.The standard stimuli of each module were identical,with a visual angle of 1°15′.The visual angles of the target stimuli were 1°15′,55′,24′,and 15′.The VA test was performed on each eye separately for all participants,and all characteristics of the P3 component were analyzed.Results There was no significant difference in the P3 peak letencies between the target stimulation angle 1°15′group and the 55′group,or between the target stimulation angle 24′group and the 15′group.There was a significant difference in the P3 peak letencies between the target stimulation angle 1°15′group and the 24′group as well as the 15′group.There was a significant difference in the P3 peak letencies between the target stimulation angle 55′group and the 24′group as well as the 15′group.No significant differences were observed in the P3 amplitude between modules.Conclusion In the oddball paradigm,P3 elicitation indicated a cognitive response to the target stimuli.These data showed that the characteristics of P3 can be used as an objective evaluation of VA. 展开更多
关键词 event-related potential P3 visual acuity forensic medicine AMPLITUDE
下载PDF
Comparison Study and Forensic Analysis between Experiment and Coupled Dynamics Simulation for Submerged Floating Tunnel Segment with Free Ends under Wave Excitations
8
作者 Woo Chul Chung Chungkuk Jin +1 位作者 Moo Hyun Kim Ju-young Hwang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期155-174,共20页
This paper presents dynamic-behavior comparisons and related forensic analyses of a submerged floating tunnel(SFT)between numerical simulation and physical experiment under regular and irregular waves.The experiments ... This paper presents dynamic-behavior comparisons and related forensic analyses of a submerged floating tunnel(SFT)between numerical simulation and physical experiment under regular and irregular waves.The experiments are conducted in the 3Dwave tank with 1:33.3 scale,and the corresponding coupled time-domain simulation tool is devised for comparison.The entire SFT systemconsists of a long concrete tunnel and 12 tubular aluminummooring lines.Two numerical simulation models,the Cummins equation with 3D potential theory including second-order wave-body interaction effects and the much simpler Morison-equation-based formula with the lumped-massbased line model,are designed and compared.Forensic analyses for mooring-line adjustments in the simulation are carried out in view of the best representation of the physical system.After that,the measured pre-tension distribution and systemstiffness of twelvemooring lines arewell reproduced in the numericalmodel.Subsequently,the dynamic responses and mooring tensions of the SFT are compared under regular and irregular waves.The measured and simulated results coincide reasonably well for both regular-and irregular-wave conditions. 展开更多
关键词 Submerged floating tunnel comparative study forensic analysis mooring-line modeling dynamic response mooring tension
下载PDF
Research on Metaverse Security and Forensics
9
作者 Guangjun Liang Jianfang Xin +3 位作者 Qun Wang Xueli Ni Xiangmin Guo Pu Chen 《Computers, Materials & Continua》 SCIE EI 2023年第10期799-825,共27页
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment circles.However,while the metaverse brings ... As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment circles.However,while the metaverse brings unprecedented opportunities for transformation to human society,it also contains related risks.Metaverse is a digital living space with information infrastructure,interoperability system,content production system,and value settlement system as the underlying structure in which the inner core is to connect real residents through applications and identities.Through social incentives and governance rules,the metaverse reflects the digital migration of human society.This article will conduct an in-depth analysis of the metaverse from the perspective of electronic data forensics.First,from the perspective of Internet development,the background and development process of the metaverse is discussed.By systematically elaborating on the concept and connotation of the metaverse,this paper summarizes the different views of current practitioners,experts,and scholars on the metaverse.Secondly,from the perspective of metaverse security,the social risk and crime risks of the metaverse are discussed.Then the importance of metaverse forensics is raised.Third,from the perspective of blockchain,smart wearable devices,and virtual reality devices,the objects and characteristics of metaverse forensics have been studied in depth.Taking smart wearable devices as an example,this paper gives the relevant experimental process of smart bracelet forensics.Finally,many challenges faced by metaverse forensics are summarized by us which provide readers with some exploratory guidance. 展开更多
关键词 Metaverse forensicS blockchain smart wear virtual reality
下载PDF
Enhancing CNN for Forensics Age Estimation Using CGAN and Pseudo-Labelling
10
作者 Sultan Alkaabi Salman Yussof Sameera Al-Mulla 《Computers, Materials & Continua》 SCIE EI 2023年第2期2499-2516,共18页
Age estimation using forensics odontology is an important process in identifying victims in criminal or mass disaster cases.Traditionally,this process is done manually by human expert.However,the speed and accuracy ma... Age estimation using forensics odontology is an important process in identifying victims in criminal or mass disaster cases.Traditionally,this process is done manually by human expert.However,the speed and accuracy may vary depending on the expertise level of the human expert and other human factors such as level of fatigue and attentiveness.To improve the recognition speed and consistency,researchers have proposed automated age estimation using deep learning techniques such as Convolutional Neural Network(CNN).CNN requires many training images to obtain high percentage of recognition accuracy.Unfortunately,it is very difficult to get large number of samples of dental images for training the CNN due to the need to comply to privacy acts.A promising solution to this problem is a technique called Generative Adversarial Network(GAN).GAN is a technique that can generate synthetic images that has similar statistics as the training set.A variation of GAN called Conditional GAN(CGAN)enables the generation of the synthetic images to be controlled more precisely such that only the specified type of images will be generated.This paper proposes a CGAN for generating new dental images to increase the number of images available for training a CNN model to perform age estimation.We also propose a pseudolabelling technique to label the generated images with proper age and gender.We used the combination of real and generated images to trainDentalAge and Sex Net(DASNET),which is a CNN model for dental age estimation.Based on the experiment conducted,the accuracy,coefficient of determination(R2)and Absolute Error(AE)of DASNET have improved to 87%,0.85 and 1.18 years respectively as opposed to 74%,0.72 and 3.45 years when DASNET is trained using real,but smaller number of images. 展开更多
关键词 Dental forensics age estimation generative adversarial network pseudo-labelling convolutional neural network
下载PDF
Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation
11
作者 Waleed Halboob Jalal Almuhtadi 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2071-2092,共22页
Privacy preservation(PP)in Digital forensics(DF)is a conflicted and non-trivial issue.Existing solutions use the searchable encryption concept and,as a result,are not efficient and support only a keyword search.Moreov... Privacy preservation(PP)in Digital forensics(DF)is a conflicted and non-trivial issue.Existing solutions use the searchable encryption concept and,as a result,are not efficient and support only a keyword search.Moreover,the collected forensic data cannot be analyzed using existing well-known digital tools.This research paper first investigates the lawful requirements for PP in DF based on the organization for economic co-operation and development OECB)privacy guidelines.To have an efficient investigation process and meet the increased volume of data,the presented framework is designed based on the selective imaging concept and advanced encryption standard(AES).The proposed framework has two main modules,namely Selective Imaging Module(SIM)and Selective Analysis Module(SAM).The SIM and SAM modules are implemented based on advanced forensic format 4(AFF4)and SleuthKit open source forensics frameworks,respectively,and,accordingly,the proposed framework is evaluated in a forensically sound manner.The evaluation result is compared with other relevant works and,as a result,the proposed solution provides a privacy-preserving,efficient forensic imaging and analysis process while having also sufficient methods.Moreover,the AFF4 forensic image,produced by the SIM module,can be analyzed not only by SAM,but also by other well-known analysis tools available on the market. 展开更多
关键词 Digital forensics digital evidence AFF4 privacy preservation selective imaging
下载PDF
Instagram Mobile Application Digital Forensics
12
作者 Muhammad Asim Mubarik Zhijian Wang +2 位作者 Yunyoung Nam Seifedine Kadry Muhammad Azam waqar 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期169-186,共18页
In this research,we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application,Instagram.This plugin extracts pers... In this research,we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application,Instagram.This plugin extracts personal details from Instagram users,e.g.,name,user name,mobile number,ID,direct text or audio,video,and picture messages exchanged between different Instagram users.While developing the plugin,we identified resources available in both Android and IOS-based devices holding key forensics artifacts.We highlighted the poor privacy scheme employed by Instagram.This work,has shown how the sensitive data posted in the Instagram mobile application can easily be reconstructed,and how the traces,as well as the URL links of visual messages,can be used to access the privacy of any Instagram user without any critical credential verification.We also employed the anti-forensics method on the Instagram Android’s application and were able to restore the application from the altered or corrupted database file,which any criminal mind can use to set up or trap someone else.The outcome of this research is a plugin for our digital forensics ready framework software which could be used by law enforcement and regulatory agencies to reconstruct the digital evidence available in the Instagram mobile application directories on both Android and IOS-based mobile phones. 展开更多
关键词 Digital forensics Instagram mobile application forensics antiforensics forensics framework plugin
下载PDF
Internet of Things for Digital Forensics Application in Saudi Arabia
13
作者 Faihan B. Bindrwish Amer Nizar Abu Ali +4 位作者 Wed H. Ghabban Alaaldin Alrowwad Najmah Adel Fallatah Omair Ameerbakhsh Ibrahim M. Alfadli 《Advances in Internet of Things》 2023年第1期1-11,共11页
Despite the extensive empirical literature relating to the Internet of Things (IoT), surprisingly few attempts have sought to establish the ways in which digital forensics can be applied to undertake detailed examinat... Despite the extensive empirical literature relating to the Internet of Things (IoT), surprisingly few attempts have sought to establish the ways in which digital forensics can be applied to undertake detailed examinations regarding IoT frameworks. The existing digital forensic applications have effectively held back efforts to align the IoT with digital forensic strategies. This is because the forensic applications are ill-suited to the highly complex IoT frameworks and would, therefore, struggle to amass, analyze and test the necessary evidence that would be required by a court. As such, there is a need to develop a suitable forensic framework to facilitate forensic investigations in IoT settings. Nor has considerable progress been made in terms of collecting and saving network and server logs from IoT settings to enable examinations. Consequently, this study sets out to develop and test the FB system which is a lightweight forensic framework capable of improving the scope of investigations in IoT environments. The FB system can organize the management of various IoT devices found in a smart apartment, all of which is controlled by the owner’s smart watch. This will help to perform useful functions, automate the decision-making process, and ensure that the system remains secure. A Java app is utilized to simulate the FB system, learning the user’s requirements and security expectations when installed and employing the MySQL server as a means of logging the communications of the various IoT devices. 展开更多
关键词 Smart Home Internet of Things Digital forensic FB Framework
下载PDF
Forensics: Collection of Sound Digital Evidence
14
作者 Richard Kabanda Harihar Thapa Luis Rivera 《Journal of Information Security》 2023年第4期454-463,共10页
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd... This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court. 展开更多
关键词 Electronic Discovery Reference Model National Institute of Standards and Technology (NIST) Message-Digest Algorithm Secure Hash Algorithm forensically Sound Digital Evidence
下载PDF
The Quality in Psychiatric Care-Forensic In-Patient Staff (QPC-FIPS) instrument: Psychometric properties and staff views of the quality of forensic psychiatric services in Sweden 被引量:1
15
作者 Agneta Schroder Lars-Olov Lundqvist 《Open Journal of Nursing》 2013年第3期330-341,共12页
The aim of the present study was to evaluate the psychometric properties and dimensionality of the instrument Quality in Psychiatric Care-Forensic In-Patient Staff (QPC-FIPS) and to describe the perceived quality of p... The aim of the present study was to evaluate the psychometric properties and dimensionality of the instrument Quality in Psychiatric Care-Forensic In-Patient Staff (QPC-FIPS) and to describe the perceived quality of psychiatric care among forensic inpatient service staff. A sample of 348 forensic inpatient staff from 18 forensic wards in Sweden participated in the study. A confirmatory factor analysis revealed a seven-factor structure with item loadings > 0.50 on expected factors, indicating adequate psychometric properties. The staff’s ratings of quality of care were high, 94% being positive. The highest ratings were found for the secluded-environment dimension and the lowest for the secure-environment dimension. Several factors influenced the ratings of quality of care, for instance, staff’s time to perform their duties and staff’s age. It is concluded that the QPC-FIPS can give valuable information about staff’s perceptions of the quality of care provided at inpatient forensic psychiatric care services, which can be used to identify areas for quality improvement. Use of the QPC-FIPS is an easy and inexpensive way to evaluate quality in forensic inpatient care, preferably in conjunction with the QPC-FIP instrument developed for forensic inpatients and covering the same items and dimensions. 展开更多
关键词 forensic Inpatient Care Psychiatry Psychometric Properties Sweden Quality in Psychiatric Care-forensic In-Patient Staff (QPC-FIPS) Quality of Care
下载PDF
Forensic Readiness: Emerging Discipline for Creating Reliable and Secure Digital Evidence
16
作者 Barbara Endicott-Popovsky Nicolai Kuntze Carsten Rudolph 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第1期1-8,共8页
Traditional approaches to digital forensics reconstruct events within digital systems that often are not built for the creation of evidence; however,there is an emerging discipline of forensic readiness that examines ... Traditional approaches to digital forensics reconstruct events within digital systems that often are not built for the creation of evidence; however,there is an emerging discipline of forensic readiness that examines what it takes to build systems and devices that produce digital data records for which admissibility is a requirement. This paper reviews the motivation behind research in this area,a generic technical solution that uses hardware-based security to bind digital records to a particular state of a device and proposed applications of this solution in concrete,practical scenarios. Research history in this area,the notion of secure digital evidence and a technical solution are discussed. A solution to creating hardware-based security in devices producing digital evidence was proposed in 2012. Additionally,this paper revises the proposal and discusses three distinct scenarios where forensic readiness of devices and secure digital evidence are relevant. It shows,how the different requirements of the three scenarios can be realized using a hardware-based solution. The scenarios are:lawful interception of voice communication,automotive black box,precise farming. These three scenarios come from very distinctive application domains. Nevertheless,they share a common set of security requirements for processes to be documented and data records to be stored. 展开更多
关键词 digital forensicS forensic READINESS calibration d
下载PDF
Investigating the Implications of Virtualization for Digital Forensics
17
作者 Song Zheng Jin Bo +1 位作者 Zhu Yinghong Sun Yongqing 《China Communications》 SCIE CSCD 2010年第6期100-106,共7页
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential role... Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared. 展开更多
关键词 digital forensics VIRTUALIZATION forensic image booting virtual machine introspection
下载PDF
Truth Behind Speech:Forensic Linguistic Analysis on Speech
18
作者 唐电弟 李艳萍 《海外英语》 2013年第23期278-279,282,共3页
We are living in a society constructed by many aspects as well as languages.There are many ways to deal with legal cases,language is also an active one among them.As it is proved that resultant of forensic linguistic ... We are living in a society constructed by many aspects as well as languages.There are many ways to deal with legal cases,language is also an active one among them.As it is proved that resultant of forensic linguistic researches do help around. 展开更多
关键词 LANGUAGE elements forensic LINGUISTICS VOICEPRINT
下载PDF
CNN-Based Forensic Method on Contrast Enhancement with JPEG Post-Processing
19
作者 Ziqing Yan Pengpeng Yang +2 位作者 Rongrong Ni Yao Zhao Hairong Qi 《Computers, Materials & Continua》 SCIE EI 2021年第12期3205-3216,共12页
As one of the most popular digital image manipulations,contrast enhancement(CE)is frequently applied to improve the visual quality of the forged images and conceal traces of forgery,therefore it can provide evidence o... As one of the most popular digital image manipulations,contrast enhancement(CE)is frequently applied to improve the visual quality of the forged images and conceal traces of forgery,therefore it can provide evidence of tampering when verifying the authenticity of digital images.Contrast enhancement forensics techniques have always drawn significant attention for image forensics community,although most approaches have obtained effective detection results,existing CE forensic methods exhibit poor performance when detecting enhanced images stored in the JPEG format.The detection of forgery on contrast adjustments in the presence of JPEG post processing is still a challenging task.In this paper,we propose a new CE forensic method based on convolutional neural network(CNN),which is robust to JPEG compression.The proposed network relies on a Xception-based CNN with two preprocessing strategies.Firstly,unlike the conventional CNNs which accepts the original image as its input,we feed the CNN with the gray-level co-occurrence matrix(GLCM)of image which contains CE fingerprints,then the constrained convolutional layer is used to extract high-frequency details in GLCMs under JPEG compression,finally the output of the constrained convolutional layer becomes the input of Xception to extract multiple features for further classification.Experimental results show that the proposed detector achieves the best performance for CE forensics under JPEG post-processing compared with the existing methods. 展开更多
关键词 Contrast enhancement forensics convolutional neural networks robust forensics JPEG compression
下载PDF
Perception of Forensic Accountants About Elaboration of Free Judicial Expertise in Brazil
20
作者 Anna Paula Leal de Sousa Idalberto Jos6 das Neves Jfinior Helder Bueno Leal 《Journal of Modern Accounting and Auditing》 2012年第8期1126-1139,共14页
The Article 23 in the Universal Declaration of Human Rights mentions that all work must have a fair and favorable remuneration. However, in Brazil, the State uses the free legal aid as a way of minimizing the social a... The Article 23 in the Universal Declaration of Human Rights mentions that all work must have a fair and favorable remuneration. However, in Brazil, the State uses the free legal aid as a way of minimizing the social and economic inequality, making it possible for the needy to have access to justice. Through the free legal aid, the litigant is exempted from payment of fees and legal expenses and court, thus, transferring the burden of work to professionals who assist in the judicial process. So, the magistrate can appoint an expert accountant to assist him in the trial of the legal question when the proof requires accounting knowledge. In this way, this article discusses the accounting expertise that is free of charge from the perception of expert accountants. The authors had applied questionnaires in August and September in 2008, and obtained 131 responses and 2,859 data. From this research, the authors observed that the majority of respondents when solicited to work with the possibility of non-payment attended the demand, and believed that this would contribute to society and assist the magistrate. 展开更多
关键词 forensic accounting forensic accountant's honorarium free expertise
下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部