نتایج جستجو برای: forensic analysis
تعداد نتایج: 2838553 فیلتر نتایج به سال:
Supercritical fluid technology is a rapidly expanding analytical technique. Here we give a brief insight into the background of supercritical fluid technology and how supercritical fluid extraction and supercritical fluid chromatography work in analysis. The applications of these two techniques in forensic science are known to be important. The main area of forensic use of supercritical fluid t...
The iPod Touch, iPhone and iPad from Apple are among the most popular mobile computing platforms in use today. These devices are of forensic interest because of their high adoption rate and potential for containing digital evidence. The uniformity in their design and underlying operating system (iOS) also allows forensic tools and methods to be shared across product types. This paper analyzes t...
With the growing number of digital forensic tools and the increasing use of digital forensics in various contexts, including incident response and cyber threat intelligence, there is a pressing need for a widely accepted standard for representing and exchanging digital forensic information. Such a standard representation can support correlation between different data sources, enabling more effe...
OBJECTIVE To determine the attitudes nurses working at psychiatric hospitals in Turkey have towards forensic psychiatric patients and the associated factors. MATERIALS AND METHODS This cross-sectional study included 620 nurses working at 8 psychiatric hospitals in Turkey that completed ≥80% of the Nurses' Attitudes Towards Forensic Psychiatric Patients Scale (NAFPPS). Data were evaluated base...
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of...
Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent...
AIM To describe the contribution of forensic anthropology to the recovery, analysis, and identification of victims from the 1991-1995 war in Croatia recovered in wells. METHODS From 1996 to the present, human remains of a total of 61 individuals have been recovered from 13 wells. Six wells contained the remains of a single individual, one well contained the remains of 2 individuals, and 6 wel...
Introduction. We apply the theoretical framework and formal model of the observation tuple with the credibility weight for forensic analysis of the IDS data and the corresponding event reconstruction. Forensic Lucid – a forensic case modeling and specification language is used for the task. In the ongoing theoretical and practical work, Forensic Lucid is augmented with the Dempster-Shafer theor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید