To see the other types of publications on this topic, follow the link: Forensic detection.

Journal articles on the topic 'Forensic detection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Forensic detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Iacono, William G. "Forensic “Lie Detection”." Journal of Forensic Psychology Practice 1, no. 1 (2001): 75–86. http://dx.doi.org/10.1300/j158v01n01_05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Suttipasit, Papanu. "Forensic Spermatozoa Detection." American Journal of Forensic Medicine and Pathology 40, no. 4 (2019): 304–11. http://dx.doi.org/10.1097/paf.0000000000000517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

O. A., Leonenko, Yesypenko O. H., and Rakhilchuk І.V. "Modern legal and organizational principles for the development of judicial examination in crime investigation." Scientific Herald of Sivershchyna. Series: Law 2020, no. 2 (2020): 93–101. http://dx.doi.org/10.32755/sjlaw.2020.02.093.

Full text
Abstract:
The scientific article is devoted to the problems of using forensic examinations and their results in the pre-trial investigation. Perspective directions of development of criminology according to its components are defined. The current state of develop-ment of forensic technology, tools and cybernetics in general, which is successfully used in forensics makes it possible to use retinal schemes to register criminals. It is noted that the development of forensic technologies involves the develop-ment of information retrieval programs, such as Automated Workplaces (AWP) for pre-trial investigati
APA, Harvard, Vancouver, ISO, and other styles
4

Liodorova, Julija, Irina Voronova, and Ruta Shneidere. "ADVANCED FORENSIC METHODS TO DETECT FRAUD." Criminalistics and Forensics, no. 66 (2021): 66–73. http://dx.doi.org/10.33994/kndise.2021.66.06.

Full text
Abstract:
The aim of the article is to study forensic accounting methods to detect fraud in financial statements. A taxonomy of forensic analytics methods is proposed and a generalization of seven mathematical models for detecting fraud recommended by forensic accounting experts and practitioners is provided, allowing for the detection of fraudulent financial statements before it is too late. The authors’ qualitative analysis of evaluating fraud detection models is based on data from semi-structured interviews conducted in the focus group of forensic accountants, investigators, and prosecutors.
APA, Harvard, Vancouver, ISO, and other styles
5

Narang*, Deepak, Reena Kulshreshtra, Fatima Khan, et al. "Microbes in forensic medicine: a microbiologist perspective." International Journal of Bioassays 5, no. 10 (2016): 4913. http://dx.doi.org/10.21746/ijbio.2016.10.004.

Full text
Abstract:
Microbial forensics is a naïve branch that involves multi-disciplinary approach to detection, tracing and evidencing the bio crime, with a predominant microbiological approach by studying evidence from inadvertent microorganism or its toxins released in bioterrorism act, biocrime, or for attribution purposes using advanced molecular techniques. Methods for identification and attribution of potential microbial weapons is challenging and forensic microbiological investigations involves crime scene investigation, chain of custody practices, evidence collection, handling and preservation, evidence
APA, Harvard, Vancouver, ISO, and other styles
6

Laijie, Lu, Yang Gaobo, and Xia Ming. "Anti-Forensics for Unsharp Masking Sharpening in Digital Images." International Journal of Digital Crime and Forensics 5, no. 3 (2013): 53–65. http://dx.doi.org/10.4018/jdcf.2013070104.

Full text
Abstract:
As a retouching tool, image sharpening can be applied as the final step to hide those possible forgery operations in an image. Unsharp masking (USM) is a popular sharpening method supported by most image editing software such as Adobe Photoshop. Several passive forensics methods have been presented for the detection of USM Sharpening. In this paper, an anti-forensic scheme for USM Sharpening is proposed to invalidate the existing forensic algorithms. It removes the overshoot artifacts in image edges and abrupt change in histogram ends. The effectiveness of the proposed method is proved by the
APA, Harvard, Vancouver, ISO, and other styles
7

Kitpipit, Thitika, Nathinee Panvisavas, and Nuntavan Bunyapraphatsara. "Forensic detection of marijuana trace." Forensic Science International: Genetics Supplement Series 1, no. 1 (2008): 600–602. http://dx.doi.org/10.1016/j.fsigss.2007.11.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bond, John W. "A strategy for the forensic detection of distraction burglary." International Journal of Police Science & Management 18, no. 4 (2016): 251–60. http://dx.doi.org/10.1177/1461355716667526.

Full text
Abstract:
Although much reduced in recent years, distraction burglary involving elderly or vulnerable victims continues to make up ∼ 4% of recorded UK domestic burglaries. Detection of these offences by forensic means, such as DNA or fingerprints, can be problematic due to the forensic awareness of the offender and a lack of recall by the victim. In this study, we consider a range of measures designed to improve the forensic detection of distraction burglary using trace DNA or fingerprints. Our findings show that attendance at a distraction burglary by two crime scene investigators, one of whom conducte
APA, Harvard, Vancouver, ISO, and other styles
9

Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.

Full text
Abstract:
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be used to identify the source of the intrusion and the intruder’s location. Forensics can resolve many c
APA, Harvard, Vancouver, ISO, and other styles
10

Kerniakevych-Tanasiichuk, Yuliia V., Viktor S. Sezonov, Iryna M. Nychytailo, Maryna A. Savchuk, and Iryna V. Tsareva. "Problems of forensic identification of handwriting in forensic examination." Journal of the National Academy of Legal Sciences of Ukraine 28, no. 1 (2021): 195–204. http://dx.doi.org/10.37635/jnalsu.28(1).2021.195-204.

Full text
Abstract:
The handwritten signature as a characteristic of authentication has been legally and publicly recognised for centuries and has been used in the forensic field for many decades to identify an author. Approaches to biometric user authentication developed in recent years are also based in part on handwriting characteristics, such as automatic signature verification. This article systematically identifies handwriting features published in forensics and analyses which of these properties can be adapted as biometrics to verify the user. A user verification procedure based on a set of 14 forensic cha
APA, Harvard, Vancouver, ISO, and other styles
11

Il’in, N. N. "Subject, Objects and Types of Railway Forensics." Theory and Practice of Forensic Science 15, no. 2 (2020): 21–26. http://dx.doi.org/10.30764/1819-2785-2020-2-21-26.

Full text
Abstract:
Railway forensic examinations are one of the primary means to establish the circumstances in the detection and investigation of crimes connected to the safety of traffic and operation of railway transport or traffic accidents. This type of forensic expertise falls within the class of transport and technical forensic examinations together with aviation, auto-technical, and water-technical. The forensic and expert literature still has not developed any theoretical provisions concerning the subject of the railway forensics, its objects, tasks, as well as the methodology for conducting the study.
APA, Harvard, Vancouver, ISO, and other styles
12

Umar, Bello, Umar Abbas Ibrahim, and Peter Eriki. "Forensic Accounting and Incidence of Fraud Detection." International Journal of Finance & Banking Studies (2147-4486) 9, no. 2 (2020): 72–81. http://dx.doi.org/10.20525/ijfbs.v9i2.680.

Full text
Abstract:
The study described and explained forensic accounting and the incidence of fraud detection in Nigeria. The objectives of this study were to identify personal skills requirements and, assess the types of investigative techniques used in forensic accounting. A literature review was conducted to set up the conceptual and theoretical framework for the study. A quantitative approach was used by administering a structured questionnaire. A total of 101 investigators from Economic and Financial Crimes Commission (EFCC) were used as sample for the study. We employed Jarque Bera statistics to conduct th
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (2020): 9. http://dx.doi.org/10.3390/jimaging6030009.

Full text
Abstract:
Image source forensics is widely considered as one of the most effective ways to verify in a blind way digital image authenticity and integrity. In the last few years, many researchers have applied data-driven approaches to this task, inspired by the excellent performance obtained by those techniques on computer vision problems. In this survey, we present the most important data-driven algorithms that deal with the problem of image source forensics. To make order in this vast field, we have divided the area in five sub-topics: source camera identification, recaptured image forensic, computer g
APA, Harvard, Vancouver, ISO, and other styles
14

Tambo, Francis, and Dorcas Naa Odarley Ablateye. "A review on the role of emerging revolutionary nanotechnology in forensic investigations." Journal of Applied and Natural Science 12, no. 4 (2020): 582–91. http://dx.doi.org/10.31018/jans.v12i4.2415.

Full text
Abstract:
Due to the unique properties of nanoparticles, it has gained prominence in lots of fields with extensive research being carried around it. With lots of novel applications arising from this field, Forensic science seems to be one of the fast-growing fields in nano research applications. The growing and extensive use of nanotechnology being applied in forensic investigations is promising and could soon be the tipping point in the discipline. Applications mainly have been related to evidence identification and analysis in the broad major fields in Forensic Science such as single-crystalline semic
APA, Harvard, Vancouver, ISO, and other styles
15

Bhalerao, Abhir, and Gregory Reynolds. "Ruler Detection for Autoscaling Forensic Images." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 9–27. http://dx.doi.org/10.4018/ijdcf.2014010102.

Full text
Abstract:
The assessment of forensic photographs often requires the calibration of the resolution of the image so that accurate measurements can be taken of crime-scene exhibits or latent marks. In the case of latent marks, such as fingerprints, image calibration to a given dots-per-inch is a necessary step for image segmentation, preprocessing, extraction of feature minutiae and subsequent fingerprint matching. To enable scaling, such photographs are taken with forensic rulers in the frame so that image pixel distances can be converted to standard measurement units (metric or imperial). In forensic bur
APA, Harvard, Vancouver, ISO, and other styles
16

Nikitina, I. E. "Current Issues in Justice and Home Affairs Cooperation between EU Member States Pertaining to Forensic Services and Investigative Operations." Theory and Practice of Forensic Science 12, no. 3 (2017): 110–18. http://dx.doi.org/10.30764/1819-2785-2017-12-3-110-118.

Full text
Abstract:
The paper discusses the EU's decision to establish the first supranational law enforcement body – the European Public Prosecutor's Office (EPPO) – and further articulates the notion of “supranationalism”. The author argues for the need to develop a strategic plan for interaction between the Prosecutor General's Office of the Russian Federation and the EPPO to ensure effective oversight over the practice of forensic science and criminalistics, lawfulness of the actions of preliminary investigation units conducting forensic and search operations, and the use of specialized knowledge in transnati
APA, Harvard, Vancouver, ISO, and other styles
17

Nandini Rout, Aishwari, Shivali Pandit, Harshada Patil, and VijayKumar Patil. "Detection of Gender Using Digital Forensic." International Journal of Computer Trends and Technology 68, no. 3 (2020): 7–13. http://dx.doi.org/10.14445/22312803/ijctt-v68i3p102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Aminu, Ali Ahmad, and Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)." Signal & Image Processing : An International Journal 12, no. 2 (2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.

Full text
Abstract:
Digital image tampering detection has been an active area of research in recent times due to the ease with which digital image can be modified to convey false or misleading information. To address this problem, several studies have proposed forensics algorithms for digital image tampering detection. While these approaches have shown remarkable improvement, most of them only focused on detecting a specific type of image tampering. The limitation of these approaches is that new forensic method must be designed for each new manipulation approach that is developed. Consequently, there is a need to
APA, Harvard, Vancouver, ISO, and other styles
19

Aramilev, S. V., E. S. Kiseleva, and P. V. Fomenko. "Forensic Investigation of Crimes Against the Amur Tiger and Other Animals: Problems and Solutions." Theory and Practice of Forensic Science 12, no. 3 (2017): 105–9. http://dx.doi.org/10.30764/1819-2785-2017-12-3-105-109.

Full text
Abstract:
The late 20th century saw the development of a new special framework for the conservation of large mammals – both tigers and their prey, mostly ungulates, – along with their habitats in the Far East of Russia. Tightening controls on poaching, illicit trafficking and trade in wild animals and their parts, as well as enforcement of adequate penalties for these crimes rely on effective crime detection procedures and quality forensic investigation, which provides important grounds for prosecution. There are currently only four organizations conducting such forensic investigations within the geogra
APA, Harvard, Vancouver, ISO, and other styles
20

He, Yong Hui. "Image Tampering with Evidence Algorithm Based on Copy and Paste." Advanced Materials Research 1044-1045 (October 2014): 1178–81. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1178.

Full text
Abstract:
Authenticity, integrity and authentication primitive technology for digital image content case of digital image forensics, as one branch of information security technology, is not pre-embedded image watermarks to forensic identification. In this paper, a common digital image tampering copy and paste operations have been studied and proposed detection method for this operation to improve the robustness of the algorithm.
APA, Harvard, Vancouver, ISO, and other styles
21

Bijalwan, Anchit, Vijender Kumar Solanki, and Emmanuel Shubhakar Pilli. "BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES." Network Protocols and Algorithms 10, no. 2 (2018): 28. http://dx.doi.org/10.5296/npa.v10i2.13144.

Full text
Abstract:
Unethical hacking of sites, probing, click frauds, phishing, denial of services attack and many such malicious practices affects the organizational integrity and sovereignty. Such activities are direct attacks on the safety, security and confidentiality of the organization. These activities put organizational privacy at stake. Botnet forensic is utilized to strengthen the security issues by understanding the modus operandi of the attacks. The available observations can be utilized in future also to prevent a potential threat to network security. This paper enlightens the novel summary of previ
APA, Harvard, Vancouver, ISO, and other styles
22

Sasaki, Koichi. "Forensic examination for amylase detection by ELISA." Japanese Journal of Oral Biology 27, no. 2 (1985): 468–81. http://dx.doi.org/10.2330/joralbiosci1965.27.468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Dakhode, Gayatri, and Asst Prof P. Kumar Chourey. "Forensic Technique for Detection of Image Forgery." International Journal of Advanced Engineering Research and Science 4, no. 1 (2017): 189–93. http://dx.doi.org/10.22161/ijaers.4.1.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Tao, Biaoli, Rangding Wang, Diqun Yan, and Chao Jin. "Anti-Forensics of Double Compressed MP3 Audio." International Journal of Digital Crime and Forensics 12, no. 3 (2020): 45–57. http://dx.doi.org/10.4018/ijdcf.2020070104.

Full text
Abstract:
The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio forensics. There has been little work, however, in the field of anti-forensics, which seeks to develop a set of techniques designed to fool current forensic methodologies. The compression history of an audio sample can be used to provide evidence of audio forgeries. In this work, we present a simple method for distinguishing the MP3 compression history of an audio sample. We
APA, Harvard, Vancouver, ISO, and other styles
25

Aprilyanti Butar Butar, Sarina Gabryela. "THE APPLICATION OF PROFESSIONAL SKEPTICISM IN FRAUD DETECTION (A Case Study at BPKP Representative of Central Java Province)." Asia Pacific Fraud Journal 2, no. 2 (2018): 175. http://dx.doi.org/10.21532/apfj.001.17.02.02.05.

Full text
Abstract:
The purpose of this research is to describe the application of professional skepticism on government internal auditors of the Financial and Development Supervisory Board (BPKP) Representative of Central Java Province in detecting fraud. The application of professional skepticism will be understood based on the characters of attitude, as stated by Hurtt (2010), consisting of questioning mind, suspension on judgment, search for knowledge, interpersonal understanding, self-confidence, and selfdetermination.This research is conducted using qualitative approach and refers to theoretical proposition
APA, Harvard, Vancouver, ISO, and other styles
26

Nour Mohammad, Hasan Fayyad-Kazan, Mohamad Saab. "Anti- Forensics: The Tampering of Media." International Journal on Recent and Innovation Trends in Computing and Communication 8, no. 10 (2020): 06–30. http://dx.doi.org/10.17762/ijritcc.v8i10.5447.

Full text
Abstract:
In the context of forensic investigations, the traditional understanding of evidence is changing where nowadays most prosecutors, lawyers and judges heavily rely on multimedia signs. This modern shift has allowed the law enforcement to better reconstruct the crime scenes or reveal the truth of any critical event.In this paper we shed the light on the role of video, audio and photos as forensic evidences presenting the possibility of their tampering by various easy-to-use, available anti-forensics softwares. We proved that along with the forensic analysis, digital processing, enhancement and au
APA, Harvard, Vancouver, ISO, and other styles
27

Pratapur, S. B., and S. D. Chikte. "Pixel Based Forensic Image Forgery Detection using Signature Resembling Detection and Signature Detection Algorithm." International Journal of Computer Sciences and Engineering 6, no. 10 (2018): 44–53. http://dx.doi.org/10.26438/ijcse/v6i10.4453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Serketzis, Nikolaos, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, and George J. Pangalos. "Actionable threat intelligence for digital forensics readiness." Information & Computer Security 27, no. 2 (2019): 273–91. http://dx.doi.org/10.1108/ics-09-2018-0110.

Full text
Abstract:
PurposeThe purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of cyber threat information sharing.Design/methodology/approachThis paper uses a quantitative methodology to identify the most popular cyber threat intelligence (CTI) elements and introduces a lightweight approach to correlate those with potential forensic value, resulting in the quick and accurate triaging and identification of patterns of malicious activities.FindingsWhile threat intelligence exchange steadily becom
APA, Harvard, Vancouver, ISO, and other styles
29

Hollien, Harry. "About forensic phonetics." Linguistica 52, no. 1 (2012): 27–53. http://dx.doi.org/10.4312/linguistica.52.1.27-53.

Full text
Abstract:
This article sets forth the goals and content of Forensic Phonetics and its major elements. Considered are 1) the processing and analysis of spoken utterances, 2) enhancement of speech intelligibility (re: surveillance and other recordings), 3) authentication of recordings, 4) speaker identification, and 5) detection of deception, intoxication, and emotions in speech. Stress in speech, and the psychological stress evaluation systems that some individuals attempt to use as lie detectors also will be considered.
APA, Harvard, Vancouver, ISO, and other styles
30

Huck, Christian W., Verena Huck-Pezzei, Rania Bakry, et al. "Capillary Electrophoresis Coupled To Mass Spectrometry for Forensic Analysis." Open Chemical Engineering Journal 1, no. 1 (2007): 30–43. http://dx.doi.org/10.2174/1874123100701010030.

Full text
Abstract:
In this review the most important techniques, which are developed to hyphenate capillary electrophoresis to mass spectrometry (CE-MS), suitable for forensic analysis, are summarized. Analytes of interest are divided into four main parts, namely, compounds with amine containing side chains, compounds with N-containing saturated ring structures, other heterocycles and peptides. Sample pre-treatments and direct injection modes used in CE-MS for forensic analysis are briefly discussed from critical point of view. Special emphasis is placed to point out the advantages of mass spectrometric detectio
APA, Harvard, Vancouver, ISO, and other styles
31

Kostyuchenko, O. G., and O. V. Volokhova. "Comparative characteristics of the activities of a forensic specialist and a forensic investigator." Courier of Kutafin Moscow State Law University (MSAL)), no. 2 (May 17, 2021): 69–77. http://dx.doi.org/10.17803/2311-5998.2021.78.2.069-077.

Full text
Abstract:
The article is devoted to the use of special knowledge in the investigation of crimes, the activities of a specialist criminalist, a forensic investigator, and a comparative description of their activities in the investigation of crimes. In the context of criminalization of society, which leads to the emergence of new types of crimes, more sophisticated ways to commit them and conceal them using sophisticated technical means, insufficient attention is obviously paid to the use of special knowledge, including forensic knowledge, carried out in both procedural and non-procedural forms, the tasks
APA, Harvard, Vancouver, ISO, and other styles
32

Yan, Diqun, Xiaowen Li, Li Dong, and Rangding Wang. "An Antiforensic Method against AMR Compression Detection." Security and Communication Networks 2020 (September 2, 2020): 1–8. http://dx.doi.org/10.1155/2020/8849902.

Full text
Abstract:
Adaptive multirate (AMR) compression audio has been exploited as an effective forensic evidence to justify audio authenticity. Little consideration has been given, however, to antiforensic techniques capable of fooling AMR compression forensic algorithms. In this paper, we present an antiforensic method based on generative adversarial network (GAN) to attack AMR compression detectors. The GAN framework is utilized to modify double AMR compressed audio to have the underlying statistics of single compressed one. Three state-of-the-art detectors of AMR compression are selected as the targets to b
APA, Harvard, Vancouver, ISO, and other styles
33

Raharjo, Tri Puji, Syahril Djaddang, and Edy Supriyadi. "Peran Kode Etik Atas Pengaruh Akuntansi Forensik, Audit Investigatif dan Data Mining Terhadap Pendeteksian Dugaan Tindak Pidana Pencucian Uang." Jurnal Riset Akuntansi & Perpajakan (JRAP) 7, no. 02 (2020): 219–34. http://dx.doi.org/10.35838/jrap.2020.007.02.19.

Full text
Abstract:
ABSTRACT
 This research aims to examine and analyze the effect of forensic accounting, investigative audit and data mining on detection of criminal act of money laundering’s suspicion with the role of ethics code as a moderating factor. The research object are the analyst and examiner of financial transaction of a governmental institution named Pusat Pelaporan and Analisis Transaksi Keuangan (Indonesian Financial Transaction Report and Analysis Centre) with a total of 40 respondents. This research is using nonprobability sampling method. Data analysis is performed using Stuctural Equation
APA, Harvard, Vancouver, ISO, and other styles
34

Raharjo, Tri Puji, Syahril Djaddang, and Edy Supriyadi. "Peran Kode Etik Atas Pengaruh Akuntansi Forensik, Audit Investigatif dan Data Mining Terhadap Pendeteksian Dugaan Tindak Pidana Pencucian Uang." Jurnal Riset Akuntansi & Perpajakan (JRAP) 7, no. 02 (2020): 219–34. http://dx.doi.org/10.35838/jrap.v7i02.1677.

Full text
Abstract:
ABSTRACT
 This research aims to examine and analyze the effect of forensic accounting, investigative audit and data mining on detection of criminal act of money laundering’s suspicion with the role of ethics code as a moderating factor. The research object are the analyst and examiner of financial transaction of a governmental institution named Pusat Pelaporan and Analisis Transaksi Keuangan (Indonesian Financial Transaction Report and Analysis Centre) with a total of 40 respondents. This research is using nonprobability sampling method. Data analysis is performed using Stuctural Equation
APA, Harvard, Vancouver, ISO, and other styles
35

Omelian, O. "CONCEPT AND SIGNS OF DIGITAL TRACES THAT FORM DURING CYBERCRIMES." Criminalistics and Forensics, no. 65 (May 18, 2020): 457–66. http://dx.doi.org/10.33994/kndise.2020.65.45.

Full text
Abstract:
The article considers scientific views on terminology in the field of forensics and forensic examination for the investigation of cybercrime, as well as taking into account the specific use of information and telecommunication technologies in forensics, the validity of the term’s use “digital traces” is substantiated. The author’s definition of the concept of digital traces that are formed during the commission of cybercrimes is proposed. Its specific signs and properties are presented and analyzed as well. The necessity of using special knowledge and appropriate expert equipment to search for
APA, Harvard, Vancouver, ISO, and other styles
36

Honigsberg, Colleen. "Forensic Accounting." Annual Review of Law and Social Science 16, no. 1 (2020): 147–64. http://dx.doi.org/10.1146/annurev-lawsocsci-020320-022159.

Full text
Abstract:
Forensic accounting serves as a regulatory and investment tool that allows interested professionals to predict whether firms are engaged in financial reporting misconduct. Financial reporting misconduct has severe economic and personal consequences. Not only does such misconduct distort the allocation of economic resources, but investors and employees of these firms incur substantial financial and psychological harms. In essence, forensic accounting aims to mitigate these harms by predicting the likelihood a firm has committed financial reporting misconduct—thus allowing for early detection of
APA, Harvard, Vancouver, ISO, and other styles
37

Wójtowicz, Tomas, and Dariusz Bułka. "Ellipse Detection in Forensic Blood Stain Images Analysis." Computing and Informatics 37, no. 1 (2018): 213–28. http://dx.doi.org/10.4149/cai_2018_1_213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bayzid, Md, Mohiuddin Shoikot, Jafrul Hossain, and Anisur Rahman. "Keylogger Detection using Memory Forensic and Network Monitoring." International Journal of Computer Applications 177, no. 11 (2019): 17–21. http://dx.doi.org/10.5120/ijca2019919483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mohanty, Mihir Narayan, and Saumendra Kumar Mohapatra. "ECG Biometrics in Forensic Application for Crime Detection." Medico-Legal Update 19, no. 1 (2019): 749. http://dx.doi.org/10.5958/0974-1283.2019.00131.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Khan, Zohaib, Faisal Shafait, and Ajmal Mian. "Automatic ink mismatch detection for forensic document analysis." Pattern Recognition 48, no. 11 (2015): 3615–26. http://dx.doi.org/10.1016/j.patcog.2015.04.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kitamura, Osamu. "Detection of methamphetamine neurotoxicity in forensic autopsy cases." Legal Medicine 11 (April 2009): S63—S65. http://dx.doi.org/10.1016/j.legalmed.2009.01.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Hwang, Jae-Jeong. "Forensic Detection of Filtration Forgery in Digital Images." Journal of the Institute of Electronics and Information Engineers 56, no. 1 (2019): 85–91. http://dx.doi.org/10.5573/ieie.2019.56.1.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hostiuc, S., D. Pirici, I. Negoi, D. A. Ion, and M. Ceausu. "Detection of diffuse axonal injury in forensic pathology." Romanian Journal of Legal Medicine 22, no. 3 (2014): 145–52. http://dx.doi.org/10.4323/rjlm.2014.145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Cao, Gang, Yao Zhao, Rongrong Ni, Bo Ou, and Yongbin Wang. "Forensic detection of noise addition in digital images." Journal of Electronic Imaging 23, no. 2 (2014): 023004. http://dx.doi.org/10.1117/1.jei.23.2.023004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hayes, Jill S., David B. Hale, and William Drew Gouvier. "Malingering Detection in a Mentally Retarded Forensic Population." Applied Neuropsychology 5, no. 1 (1998): 33–36. http://dx.doi.org/10.1207/s15324826an0501_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lane, Jeffrey D. "Book Review: Crime Science: Methods of Forensic Detection." Criminal Justice Review 25, no. 1 (2000): 143–45. http://dx.doi.org/10.1177/073401680002500125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Klevan, Leonard, Liz Horton, David P. Carlson, and Arthur J. Eisenberg. "Chemiluminescent detection of DNA probes in forensic analysis." Electrophoresis 16, no. 1 (1995): 1553–58. http://dx.doi.org/10.1002/elps.11501601258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

MORRISON, ROBERT D. "The Forensic Detection of Explosives in the Subsurface." Environmental Claims Journal 14, no. 3 (2002): 351–67. http://dx.doi.org/10.1080/10406020291041866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Horvath, Frank. "Review of:Dead Reckoning: The Art of Forensic Detection." Journal of Forensic Sciences 46, no. 3 (2001): 15036J. http://dx.doi.org/10.1520/jfs15036j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Verma, Kanak Lata, Amar Pal Singh, and Sweta Sinha. "New forensic challenges and detection of snake venom." Forensic Toxicology 36, no. 2 (2018): 537–39. http://dx.doi.org/10.1007/s11419-018-0411-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!