Macroscopic characteristics of hacking trauma.

نویسندگان

  • J H Humphrey
  • D L Hutchinson
چکیده

Hacking trauma is often encountered in forensic cases, but little experimental research has been conducted that would allow for the recognition of wounds caused by specific weapon types. In this paper, we report the results of a hacking trauma caused by machete, cleaver, and axe weapons and the characteristics of each weapon type on bone. Each weapon type was employed in multiple trials on pig (Sus scrofa) bones and then the wounds were examined macroscopically for several characteristics that serve to differentiate the weapons.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scanning electron microscopy analysis of experimental bone hacking trauma.

The authors report on their macro- and microscopy study of bone lesions made by a sharp force instrument (a single blade knife), and a sharp-blunt instrument classified as a chopping weapon (a hatchet). The aim of this work was to attempt to identify the instrument by analyzing the general class characteristics of the cuts. Each weapon was used on human bones. The results indicate that macrosco...

متن کامل

Characterizing Google Hacking: A First Large-Scale Quantitative Study

Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnera...

متن کامل

The Art and Craft of Hacking

"Hackers" are identified as software developers sharing a specific work practice. The process of hacking and the characteristics of the resulting artifacts are discussed. Some research questions following from these findings are posed.

متن کامل

Rheinisch - Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Seminar of Advanced Exploitation Techniques , WS 2006 / 2007 hacking in physically addressable memory a proof of concept by David R . Piegdon

Several advances in hacking via DMA will be introduced; attacks to steal ssh private keys, inject code and obtain an interactive shell via firewire only will be presented. All of these advances are based on data structures that are required by the CPU to provide virtual address spaces for each process running on the system. These data structures are searched and then parsed to solve the puzzle ...

متن کامل

Individual Characteristics and Hacking, Piracy, Online Gambling and Pornography Use among Students: A Study in Malaysia

In this study, 441 Universiti Teknologi Malaysia students participated as respondents. Through a questionnaire respondents were asked how frequently they engage in specific behaviors, including hacking, using pirated software, music and movies in addition to use of gambling and pornography sites. The aim was to investigate which individual characteristics including age, gender, religion, citize...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of forensic sciences

دوره 46 2  شماره 

صفحات  -

تاریخ انتشار 2001