Academic literature on the topic 'Forensic analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Forensic analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Forensic analysis"

1

Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.

Full text
Abstract:
This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices. The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns to be recognized i.e.,
APA, Harvard, Vancouver, ISO, and other styles
2

Antwi, Paul. "Device Information for Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 373–78. http://dx.doi.org/10.22624/aims/crp-bk3-p59.

Full text
Abstract:
This document provides an overview of information for forensic analysis related to device name, serial number and model of devices used to connect to social networking platforms. The increasing use of social networking applications on smartphones makes these devices a gold mine for forensic researchers. Potential evidence can be captured on these devices and recovered with the right tools and research methods. The increasing proliferation of network devices in homes and buildings increases the possibilities of finding digital traces relevant to an investigation, physical or virtual: cyber-atta
APA, Harvard, Vancouver, ISO, and other styles
3

Dodoo, Herbert Cyril. "Deep Learning (DL) Oriented Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 321–28. http://dx.doi.org/10.22624/aims/crp-bk3-p51.

Full text
Abstract:
Cyber-attacks are now more prevalent than ever before in all aspects of our daily lives. As a result of this circumstance, both individuals and organizations are fighting cybercrime on a regular basis. Furthermore, today's hackers have advanced a step further and are capable of employing complex cyber-attack strategies, exacerbating the problem. Some of these approaches are minute and undetectable, and they frequently masquerade as genuine requests and directives. To combat this threat, cyber security professionals, as well as digital forensic investigators, are constantly compelled to filter
APA, Harvard, Vancouver, ISO, and other styles
4

Sabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.

Full text
Abstract:
This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forens
APA, Harvard, Vancouver, ISO, and other styles
5

Haoyang, Xie, Jiang Keyu, Yuan Xiaohong, and Zeng Hongbiao. "FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION." FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION 4, no. 2 (2012): 121–34. https://doi.org/10.5281/zenodo.3247268.

Full text
Abstract:
Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains all of the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This paper introduces the basics of Windows Registry, describes its structure and its keys and subkeys that have forensic values. This paper also discusses how the Windows Registry forensic keys can be applied in
APA, Harvard, Vancouver, ISO, and other styles
6

Al Jouhi, Mariam, and Sara Al Hosani. "Windows Forensics Analysis." Emirati Journal of Policing & Security Studies 1, no. 1 (2022): 4–11. https://doi.org/10.54878/jagh3855.

Full text
Abstract:
Computer forensics investigates crimes on digital devices hard disk and any other digital storage devices to determine the evidence of any unauthorized access. Essentially, forensic investigators conduct forensic analysis with the help of different approaches (Static and Dynamic) and also tools like ProDiscover, Encase, Accessdata FTK and Autopsy to guarantee the security of a system in an organization. The process requires knowledge of different registry, laws, and regulations related to computer crimes, the operating system (Windows, Linux, etc.) and the network in an organization (e.g., Win
APA, Harvard, Vancouver, ISO, and other styles
7

Maulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.

Full text
Abstract:
At first, forensics was restricted to studying data that was stored on a system's hard disk. However, as storage capacity and data encryption increased, applying conventional digital forensic procedures became more challenging. As a result, memory forensics techniques are developed, or are frequently referred to as live forensics, because the process is quicker and more sophisticated. Volatile memory forensics, often known as live forensics, are necessary for this condition. Live forensics has flaws, specifically that some programs can fail when the computer is in active VSM (virtual secure mo
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Sang Young. "Mobile Digital Forensics Framework for Smartphone User Analysis." Webology 19, no. 1 (2022): 4335–51. http://dx.doi.org/10.14704/web/v19i1/web19285.

Full text
Abstract:
Blockchain-based digital forensics technology is an efficient way to prevent forgery/modulation of evidence including collecting and analyzing evidential data using the technology in compliance with smartphone forensics procedures after a smartphone is seized. Moreover, the use of large-capacity storage devices and various digital devices have become a realistic solution for its development of IT in situations where the existing digital forensics analysis methods are regarded as limitations. This paper analyzed user’s status on smartphone application and implemented a smartphone user analysis
APA, Harvard, Vancouver, ISO, and other styles
9

Lim, Michelle Chee Ern, Brandon Hong Chow Chen, Le Ying Lim, et al. "Analysis of Forensic Disk Imaging Tools for Data Acquisition and Preservation." Journal of Informatics and Web Engineering 4, no. 2 (2025): 158–81. https://doi.org/10.33093/jiwe.2025.4.2.11.

Full text
Abstract:
The identification, preservation, analysis, and presentation of electronic evidence to support legal or organizational inquiries constitute the discipline of digital forensics, which is crucial to contemporary investigations. A crucial component of forensic inquiry, disk imaging guarantees precision, dependability, and legal defensibility. To preserve the original evidence, disk imaging makes an identical, bit-by-bit duplicate of a digital storage device, capturing hidden data, deleted material, and active files. Given the critical role of disk imaging in forensic investigations, selecting the
APA, Harvard, Vancouver, ISO, and other styles
10

Dwi Syahputri, Rischi, Alexander Anggono, Prasetyono Prasetyono, and Mohamad Djasuli. "Evolution and Research Opportunities of Digital Forensic Tools: A Bibliometric Analysis." CogITo Smart Journal 10, no. 2 (2024): 474–85. https://doi.org/10.31154/cogito.v10i2.675.474-485.

Full text
Abstract:
The use of digital technology has increased rapidly, presenting new challenges such as cybercrime, online fraud and money laundering. To address these threats, digital forensic tools have become crucial in investigating and analyzing electronic evidence to combat increasingly complex digital crimes. Therefore, research and development in the field of digital forensics is crucial to address the growing digital security challenges. This study aims to conduct a bibliometric analysis of digital forensic tools research in the business, management and accounting domains over the past ten years, eval
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Forensic analysis"

1

Fairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.

Full text
Abstract:
The objective of this research is to evaluate and develop new forensic techniques for use in honeynet environments, in an effort to address areas where anti-forensic techniques defeat current forensic methods. The fields of Computer and Network Security have expanded with time to become inclusive of many complex ideas and algorithms. With ease, a student of these fields can fall into the thought pattern of preventive measures as the only major thrust of the topics. It is equally important to be able to determine the cause of a security breach. Thus, the field of Computer Forensics has grow
APA, Harvard, Vancouver, ISO, and other styles
2

Rodríguez, Mariela, and James Winefordner. "Elemental Forensic Analysis of Glass." Revista de Química, 2007. http://repositorio.pucp.edu.pe/index/handle/123456789/99672.

Full text
Abstract:
Existe una constante migración de la dependencia de mediciones de propiedades fisicas tales como índice de refracción y densidad hacia métodos de análisis elemental de trazas en la identificación de vidrios como evidencia forense. Numerosas técnicas espectroscópicas, radioquímicas, y de espectrometría de masa han sido aplicadas al análisis multielemental de pequeños trozos de vidrio. Esta revisión presenta algunos de los métodos más comúnmente empleados junto con sus ventajas y limitaciones.<br>At identifying glass as forensic evidence, there is a continued move away from dependence on physica
APA, Harvard, Vancouver, ISO, and other styles
3

Cembalo, Maurizio. "Forensic analysis for digital images." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/227.

Full text
Abstract:
IX n.s.<br>Nowadays, taking and sharing digital pictures is becoming a very popular activity. This is witnessed by the explosive growth of the digital cameras market: e.g., more than one billion of digital cameras have been produced and shipped in 2010. A consequence of this trend is that also the number of crimes involving digital pictures increases, either because pictures are part of the crime (e.g., exchanging pedopornographic pictures) or because their analysis may reveal some important clue about the author of the crime. The highly technical nature of computer crimes facilitated a
APA, Harvard, Vancouver, ISO, and other styles
4

Gettings, Katherine Butler. "Forensic Ancestry and Phenotype SNP Analysis and Integration with Established Forensic Markers." Thesis, The George Washington University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3590467.

Full text
Abstract:
<p> When an evidential DNA profile does not match identified suspects or profiles from available databases, further DNA analyses targeted at inferring the possible ancestral origin and phenotypic characteristics of the perpetrator could yield valuable information. Single Nucleotide Polymorphisms (SNPs), the most common form of genetic polymorphisms, have alleles associated with specific populations and/or correlated to physical characteristics. With this research, single base primer extension (SBE) technology was used to develop a 50 SNP assay designed to predict ancestry among the primary U.S
APA, Harvard, Vancouver, ISO, and other styles
5

Nilsson, Martina. "Mitochondrial DNA in Sensitive Forensic Analysis." Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-7458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shah, Jayna J. "Microfluidic devices for forensic DNA analysis." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2878.

Full text
Abstract:
Thesis (Ph. D.)--George Mason University, 2007.<br>Title from PDF t.p. (viewed Jan. 22, 2008). Thesis director: Rao V. Mulpuri. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering. Vita: p. 159. Includes bibliographical references (p. 145-158). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Ogwu, John. "Forensic pharmaceutical analysis of counterfeit medicines." Thesis, De Montfort University, 2018. http://hdl.handle.net/2086/17552.

Full text
Abstract:
The World Health Organisation suggests that falsified and substandard medicines (FSMs) constitute approximately 10% of medicines globally with higher figures expected in low and middle income countries (LMICs). To combat the proliferation of FSMs, this study is aimed at developing simple and rapid instrumental methods for the identification and quantification of these medicines. Attenuated Total Reflection-Fourier Transform Infrared (ATR-FTIR) spectroscopy, Raman spectroscopy and two probe Mass Spectrometry (MS) methods were assessed for the rapid screening of tablet dosage forms. These system
APA, Harvard, Vancouver, ISO, and other styles
8

van, den Berg Jelle, and Filip Lagerholm. "Forensic Analysis of the Nintendo Switch." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42451.

Full text
Abstract:
In this thesis, we did a forensic analysis of a Nintendo Switch gaming console. It is both a portable and a stationary device, which makes it so that it could contain valuable information about the usage of the console at home and elsewhere. Multiple methods of data extraction were used, including using an exploit to obtain storage memory, extracting the contents of the SD card and capturing network traffic. The findings from the analysis of these data sources were compared to the information on the user interface. Any information that could not be found on the user interface was reported. The
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Andy. "Forensic analysis on wireless medical devices." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2541.

Full text
Abstract:
The number of Internet of Things (IoT) devices is forecast to grow to over 25 billion by 2030, with the healthcare IoT market projected to grow to 25.9% of IoT devices by 2028 worldwide. However, with new and growing technologies come new types of risks. Current risk assessment and risk management methods haven’t been designed to anticipate or predict these risks. IoT risks relate to openness and lack of standardisation, linking and connectivity between the devices and the lack of skilled support for IoT devices and networks. These factors put medical IoT devices and, by extension, their users
APA, Harvard, Vancouver, ISO, and other styles
10

Eide, Jarle, and Jan Ove Skogheim Olsen. "Forensic analysis of an unknown embedded device." Thesis, Norges Teknisk-Naturvitenskaplige Universitet, Institutt for datateknikk og informasjonsvitenskap, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10060.

Full text
Abstract:
<p>Every year thousands of new digital consumer device models come on the market. These devices include video cameras, photo cameras, computers, mobile phones and a multitude of different combinations. Most of these devices have the ability to store information in one form or another. This is a problem for law enforcement agencies as they need access to all these new kinds of devices and the information on them in investigations. Forensic analysis of electronic and digital equipment has become much more complex lately because of the sheer number of new devices and their increasing internal tec
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Forensic analysis"

1

Cupples Connon, Catherine, ed. Forensic DNA Analysis. Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3295-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rudin, Norah. Forensic DNA analysis: Protocols in forensic science. CRC, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Group, Search, ed. Forensic DNA analysis: Issues. U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Belair, Robert R. Forensic DNA analysis: Issues. U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

K, Bhasin M., Surinder Nath, and Sehgal V. N, eds. Human blood analysis. Kamla-Raj Enterprises, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hamilton, Sue L. DNA analysis: Forensic fluids & follicles. ABDO Pub. Co., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Taroni, Franco, Silvia Bozza, Alex Biedermann, Paolo Garbolino, and Colin Aitken. Data Analysis in Forensic Science. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470665084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Allen, Michael. Foundations of Forensic Document Analysis. John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118729922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zadora, Grzegorz, Agnieszka Martyna, Daniel Ramos, and Colin Aitken. Statistical Analysis in Forensic Science. John Wiley & Sons Ltd, 2013. http://dx.doi.org/10.1002/9781118763155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Maher, Robert C. Principles of Forensic Audio Analysis. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99453-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Forensic analysis"

1

Resano, Martín, and Frank Vanhaecke. "Forensic Applications." In Isotopic Analysis. Wiley-VCH Verlag GmbH & Co. KGaA, 2012. http://dx.doi.org/10.1002/9783527650484.ch14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lorenzini, Rita, and Luisa Garofalo. "Wildlife Forensics: DNA Analysis in Wildlife Forensic Investigations." In Forensic DNA Analysis. Apple Academic Press, 2020. http://dx.doi.org/10.1201/9781003043027-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Finnigan, Pete. "Forensic Analysis." In Oracle Incident Response and Forensics. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3264-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zięba-Palus, Janina, and Maria Kała. "Forensic Analytics." In Handbook of Trace Analysis. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-19614-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

DiMaggio, John A., and Wesley Vernon. "Forensic Gait Analysis." In Forensic Podiatry. Humana Press, 2010. http://dx.doi.org/10.1007/978-1-61737-976-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dettmeyer, Reinhard B., Marcel A. Verhoff, and Harald F. Schütz. "Forensic DNA Analysis." In Forensic Medicine. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38818-7_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Joshi, R. C., and Emmanuel S. Pilli. "Network Forensic Analysis." In Computer Communications and Networks. Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7299-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prinz, Mechthild, and Ruediger Lessig. "Forensic DNA Analysis." In Handbook of Forensic Medicine. John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118570654.ch63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bartick, Edward G. "Criminal Forensic Analysis." In Infrared and Raman Spectroscopy in Forensic Science. John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781119962328.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

López-Monroy, A. Pastor, Hugo Jair Escalante, Manuel Montes-y-Gómez, and Xavier Baró. "Forensic Analysis Recognition." In Engineering Data-Driven Adaptive Trust-based e-Assessment Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29326-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Forensic analysis"

1

Du, Suwen, Pengpeng Yang, Daniele Baracchi, Jinglian Jin, Dasara Shullani, and Alessandro Piva. "ForensiCam-215K: A Large Scale Image and Video Dataset for Forensic Analysis." In ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2025. https://doi.org/10.1109/icassp49660.2025.10890764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dragonas, Evangelos, and Costas Lambrinoudakis. "Forensic Analysis of Android Notifications' History." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xi, Jian, Lukas Jaeckel, Michael Spranger, Melanie Siegel, and Dirk Labudde. "Forensic Communication Analysis: Challenges and Opportunities." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Monkam, Galamo F., and Nathaniel D. Bastian. "Model Poisoning Detection via Forensic Analysis." In MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM). IEEE, 2024. https://doi.org/10.1109/milcom61039.2024.10774017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lolla, Tapasvi, Wayne Li, Laurie Burnham, and Bruce King. "Forensic Analysis of Failed Photovoltaic Connectors." In 2024 IEEE 52nd Photovoltaic Specialist Conference (PVSC). IEEE, 2024. http://dx.doi.org/10.1109/pvsc57443.2024.10748973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rahman, Rizwan Ur, Abanteeka Acharya, Sanjipan Deb, and Priyanshi Panchal. "Dynamic Forensic Analysis of CryptBot Malware." In 2025 IEEE 14th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2025. https://doi.org/10.1109/csnt64827.2025.10967635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rodrigues, Anisha P., Pratham S. Shetty, Preethika Shet, et al. "Deep Learning in Forensic Sketch Analysis." In 2025 International Conference on Artificial Intelligence and Data Engineering (AIDE). IEEE, 2025. https://doi.org/10.1109/aide64228.2025.10987486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McKay, Christine, Ashwin Swaminathan, Hongmei Gou, and Min Wu. "Image acquisition forensics: Forensic analysis to identify imaging source." In ICASSP 2008 - 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2008. http://dx.doi.org/10.1109/icassp.2008.4517945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wesevich, James W., and Douglas B. Olson. "Explosion Forensic Analysis." In Structures Congress 2005. American Society of Civil Engineers, 2005. http://dx.doi.org/10.1061/40753(171)249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Kumar Shanu, Annie Irfan, and Neelam Dayal. "Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036214.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Forensic analysis"

1

Fernández Corcobado, Isabel, Alejandro Maestre Gasteazi, and Unai Tapia. Forensic Analysis of Images. Florida International University, 2024. https://doi.org/10.25148/gfjcsr.2024.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vaughan, Phillip, Golnar Nabizadeh, Laura Findlay, Heather Doran, Niamh Nic Daeid, and Mark Brown. Understanding Forensic Gait Analysis #1. Edited by Chris Murray. University of Dundee, 2020. http://dx.doi.org/10.20933/100001152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Esposito, Stephen J. Analysis of Forensic Super Timelines. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada562672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chinn, Menzie, Barry Eichengreen, and Hiro Ito. A Forensic Analysis of Global Imbalances. National Bureau of Economic Research, 2011. http://dx.doi.org/10.3386/w17513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Velsko, S. Validation Strategies for Microbial Forensic Analysis. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1056616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

David Baldwin, Max Morris, Stan Bajic, Zhigang Zhou, and James Kreiser. Statistical Tools for Forensic Analysis of Toolmarks. Office of Scientific and Technical Information (OSTI), 2004. http://dx.doi.org/10.2172/825030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Reilly, Dallas D. Molecular Forensic Science Analysis of Nuclear Materials. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Borg, L., and I. Hutcheon. Forensic Analysis of samples from the Nuclear Fuel Cycle. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1080397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chandramouli, Ramaswamy, Anoop Singhal, Duminda Wijesekera, and Changwei Liu. Methodology for enabling forensic analysis using hypervisor vulnerabilities data. National Institute of Standards and Technology, 2019. http://dx.doi.org/10.6028/nist.ir.8221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sauerwein, Kelly. Bitemark Analysis Reference List. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8352sup4.

Full text
Abstract:
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Publicly available resources relating to bitemark analysis were collected to assist in the review of the scientific foundations of bitemark analysis conducted by the National Institute of Standards and Technology (NIST). Over 400 sources were collected from literature searches and input from previous efforts by the National Institute of Justice Forensic Technology Center of Excellence, the American Board of Forensic Odontology (ABFO), and other public resources. This reference l
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!