نتایج جستجو برای: forensic analysis
تعداد نتایج: 2838553 فیلتر نتایج به سال:
Recordings from video surveillance systems are used as evidence from crime scenes. It would be useful to perform comparisons between disguised perpetrators and suspects based on their gait. We applied functional anatomical and biomechanical knowledge to analyze the gait of perpetrators, as recorded on surveillance video. Using a structured checklist, which addresses the single body segments dur...
A plug computer is essentially a cross between an embedded computer and a traditional computer, and with many of the same capabilities. However, the architecture of a plug computer makes it difficult to apply commonly used digital forensic methods. This paper describes methods for extracting and analyzing digital evidence from plug computers. Two popular plug computer models are examined, the S...
Digital forensic investigators commonly use dynamic malware analysis methods to analyze a suspect executable found during a post-mortem analysis of the victim’s computer. Unfortunately, currently proposed dynamic malware analysis methods and sandbox solutions have a number of limitations that may lead the investigators to ambiguous conclusions. In this research, the limitations of the use of cu...
Submit Manuscript | http://medcraveonline.com considered to be ideal, when it fulfills esthetic, functional and phonetic demands. It is recommended to make speech tests after establishing occlusion for function and obtaining satisfactory esthetics in dentures [1]. A prosthetic solution should not be regarded as complete without optimal control of phonetic aspects. For this purpose, some special...
It could be argued that the academic perspective of computer forensic practitioner requirements reflecting the thinking world (and is based on scientific methods) does not accurately reflect those requirements considered important by some people universities would desire as students, the computer forensic practitioners. This paper presents an analysis of data collected from full time practition...
Just as the movie Star Wars had a prequel, so did the "DNA Wars"-the series of legal, scientific, and personal battles that took place over the admissibility of forensic DNA evidence from 1989 to 1994. Between the late 1970s and the mid-1980s, another forensic identification technique became mired in controversy: electrophoresis-based blood protein analysis. Although the debates over blood anal...
As part of the Columbian College of Arts and Sciences’ natural, mathematical, and biomedical sciences programs, forensic sciences provides an understanding of the integration of forensic disciplines with the investigation of criminal activity, while providing an overview of the analytical methods, procedures, equipment, and data used by forensic specialists. Coursework emphasizes the identifica...
The proliferation of smart mobile phones with diverse features makes it possible to increase their use in criminal activities. The fast technological evolution and presence of different smart phones and their proprietary operating systems pose great difficulties for investigators and law enforcement officials to choose the best tool for forensics examination, accurate recovery and speedy analys...
Best practices have evolved within the forensic industry over the past few years to address an emerging need for organizations to properly handle malicious code incidents. While this area of forensics is increasingly strong, the industry at large struggles with how to approac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید