Journal articles on the topic 'Forensics and counter-forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Forensics and counter-forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Premanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.
Full textDOVHAN, O., and T. TKACHUK. "Combating counter-forensics as a component of digital security of critical infrastructure of Ukraine." INFORMATION AND LAW, no. 2(53) (June 24, 2025): 115–25. https://doi.org/10.37750/2616-6798.2025.2(53).334135.
Full textKeenan, Thomas. "Counter-forensics and Photography." Grey Room 55 (April 2014): 58–77. http://dx.doi.org/10.1162/grey_a_00141.
Full textKang, Xiangui, Jingxian Liu, Hongmei Liu, and Z. Jane Wang. "Forensics and counter anti-forensics of video inter-frame forgery." Multimedia Tools and Applications 75, no. 21 (2015): 13833–53. http://dx.doi.org/10.1007/s11042-015-2762-7.
Full textYang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (2020): 9. http://dx.doi.org/10.3390/jimaging6030009.
Full textIrons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.
Full textAmit, Kapoor, and Vinod Mahor Prof. "Broadcasting Forensics Using Machine Learning Approaches." International Journal of Trend in Scientific Research and Development 7, no. 3 (2023): 1034–45. https://doi.org/10.5281/zenodo.8068297.
Full textAhmed, Abdulghani Ali, Khalid Farhan, Waheb A. Jabbar, Abdulaleem Al-Othmani, and Abdullahi Gara Abdulrahman. "IoT Forensics: Current Perspectives and Future Directions." Sensors 24, no. 16 (2024): 5210. http://dx.doi.org/10.3390/s24165210.
Full textFuller, Matthew, and Nikita Mazurov. "A Counter-Forensic Audit Trail: Disassembling the Case of The Hateful Eight." Theory, Culture & Society 36, no. 6 (2019): 171–96. http://dx.doi.org/10.1177/0263276419840418.
Full textImeri Saiti, Deshira, Mentor Hamiti, and Jehona Asani. "Handling Data Security in Education." International Journal of Education & Well-Being 2, no. 2 (2024): 108–22. https://doi.org/10.62416/ijwb-41.
Full textIqbal, Saima, Wilayat Khan, Abdulrahman Alothaim, Aamir Qamar, Adi Alhudhaif, and Shtwai Alsubai. "Proving Reliability of Image Processing Techniques in Digital Forensics Applications." Security and Communication Networks 2022 (March 31, 2022): 1–17. http://dx.doi.org/10.1155/2022/1322264.
Full textElliethy, Ahmed. "Neural noiseprint transfer: a generic noiseprint-based counter forensics framework." PeerJ Computer Science 9 (April 27, 2023): e1359. http://dx.doi.org/10.7717/peerj-cs.1359.
Full textMuthusamy, Dr P., Shanmugam V, Kapilsurya R, and Saran Kumar R. "Python-Based Security Operations Center (SOC) and Forensics Analysis for Incident Cyber Threats." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2592–96. http://dx.doi.org/10.22214/ijraset.2024.60403.
Full textChlebowicz, Piotr, and Tomasz Safjański. "Considerations Regarding the Typology of Counter-Detection Measures in the Light of Quantitative Research on Organised Crime Groups that Recruit Football Hooligans." Białostockie Studia Prawnicze 29, no. 4 (2024): 161–82. https://doi.org/10.15290/bsp.2024.29.04.10.
Full textKenneth Chukwujekwu Nwafor, Ivan Zziwa, Daniel O. T. Ihenacho, and Oladele J Adeyeye. "Innovative approaches in complex data forensics: error rate assessment and its impact on cybersecurity." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 1772–92. http://dx.doi.org/10.30574/wjarr.2024.24.1.3212.
Full textKenneth, Chukwujekwu Nwafor, Zziwa Ivan, O. T. Ihenacho Daniel, and J. Adeyeye Oladele. "Innovative approaches in complex data forensics: error rate assessment and its impact on cybersecurity." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 1772–92. https://doi.org/10.5281/zenodo.15045230.
Full textStevanović, Miroslav, and Dragan Đurđević. "The role of computer forensics in the fight against terrorism." Megatrend revija 17, no. 1 (2020): 129–42. http://dx.doi.org/10.5937/megrev2001129s.
Full textBaracchi, Daniele, Dasara Shullani, Massimo Iuliani, Damiano Giani, and Alessandro Piva. "Camera Obscura: Exploiting in-camera processing for image counter forensics." Forensic Science International: Digital Investigation 38 (September 2021): 301213. http://dx.doi.org/10.1016/j.fsidi.2021.301213.
Full textDe Rosa, Alessia, Marco Fontani, Matteo Massai, Alessandro Piva, and Mauro Barni. "Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics." IEEE Signal Processing Letters 22, no. 8 (2015): 1132–36. http://dx.doi.org/10.1109/lsp.2015.2389241.
Full textDoyoddorj, Munkhbaatar, and Kyung-Hyune Rhee. "A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection." KIPS Transactions on Computer and Communication Systems 3, no. 5 (2014): 163–72. http://dx.doi.org/10.3745/ktccs.2014.3.5.163.
Full textVenkata, Udaya Sameer, and Ruchira Naskar. "Blind Image Source Device Identification." International Journal of Information Security and Privacy 12, no. 3 (2018): 84–99. http://dx.doi.org/10.4018/ijisp.2018070105.
Full textMehrish, Ambuj, A. V. Subramanyam, and Sabu Emmanuel. "Joint Spatial and Discrete Cosine Transform Domain-Based Counter Forensics for Adaptive Contrast Enhancement." IEEE Access 7 (2019): 27183–95. http://dx.doi.org/10.1109/access.2019.2901345.
Full textRamirez, Fanny. "The digital divide in the US criminal justice system." New Media & Society 24, no. 2 (2022): 514–29. http://dx.doi.org/10.1177/14614448211063190.
Full textŁabuz, Paweł, and Tomasz Safjański. "Counter-detection activities of criminal organizations aimed at reducing the effectiveness of surveillance conducted as part of operational activities." Issues of Forensic Science 298 (2017): 62–68. http://dx.doi.org/10.34836/pk.2017.298.3.
Full textSorokin, Siim. "Plausibility Under Duress: Counter-Narrative, Suspicion and Folk Forensic Contra-Plotting." Narrative Works 13, no. 1 (2024): 127–47. https://doi.org/10.7202/1115727ar.
Full textŁabuz, Paweł, and Tomasz Safjański. "Counter-detection activities of criminal groups aimed at limiting the effectiveness of operational and procedural control and interception of conversations." Issues of Forensic Science 297 (2017): 72–78. http://dx.doi.org/10.34836/pk.2017.297.4.
Full textDave, Aparna, Pearl Gupta, Manpreet Arora, and Pulin Saluja. "Dental Record-keeping: Reviving the Importance." Indian Journal of Dental Sciences 17, no. 1 (2025): 38–41. https://doi.org/10.4103/ijds.ijds_123_24.
Full textManisha, Chang-Tsun Li, Xufeng Lin, and Karunakar A. Kotegar. "Beyond PRNU: Learning Robust Device-Specific Fingerprint for Source Camera Identification." Sensors 22, no. 20 (2022): 7871. http://dx.doi.org/10.3390/s22207871.
Full textVenkatesh, M. "A Novel Digital Audio Encryption and Watermarking Scheme." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem.ncft044.
Full textVenkatesh, M. "A Novel Digital Audio Encryption and Watermarking Scheme." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem.ncft043.
Full textSMUSHKIN, A. B. "FORENSICS IN DIGITAL WORLDS (USING THE EXAMPLE OF ONLINE GAMES)." Vestnik Tomskogo gosudarstvennogo universiteta, no. 502 (2024): 214–19. https://doi.org/10.17223/15617793/502/22.
Full textSudjayanti, Shafa alya, and Dani Hamdani. "Digital Forensic Analysis Of APK Files In Phishing Scams On Whatsapp Using The NIST Method." Brilliance: Research of Artificial Intelligence 4, no. 1 (2024): 100–110. http://dx.doi.org/10.47709/brilliance.v4i1.3800.
Full textMulla, A. S. "Real-Time Cyber Security Protection Tool." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 183–86. https://doi.org/10.22214/ijraset.2025.65807.
Full textKerrakchou, Imane, Adil Abou El Hassan, Sara Chadli, Mohamed Emharraf, and Mohammed Saber. "Selection of efficient machine learning algorithm on Bot-IoT dataset for intrusion detection in internet of things networks." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 3 (2023): 1784. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1784-1793.
Full textV, Dreshpak, Prokopovych-Tkachenko D, and Rybalchenko L. "Comprehensive digital image analysis to detect manipulation." Artificial Intelligence 30, AI.2025.30(1) (2025): 77–83. https://doi.org/10.15407/jai2025.01.077.
Full textKruchinina, N. V. "Criminalistic Implementation of Counteraction to the Use of Biotechnologies in the event of Commission of Criminal Offences". Lex Russica, № 2 (28 лютого 2022): 101–7. http://dx.doi.org/10.17803/1729-5920.2022.183.2.101-107.
Full textKowalski, Marcin, and Krzysztof Mierzejewski. "Detection of 3D face masks with thermal infrared imaging and deep learning techniques." Photonics Letters of Poland 13, no. 2 (2021): 22. http://dx.doi.org/10.4302/plp.v13i2.1091.
Full textJournal, IJSREM. "Deep Fake Face Detection Using Deep Learning Tech with LSTM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28624.
Full textGarcia, Jan Mark. "Exploring Deepfakes and Effective Prevention Strategies: A Critical Review." Psychology and Education: A Multidisciplinary Journal 33, no. 1 (2025): 93–96. https://doi.org/10.70838/pemj.330107.
Full textBarni, Mauro, Marco Fontani, and Benedetta Tondi. "A Universal Attack Against Histogram-Based Image Forensics." International Journal of Digital Crime and Forensics 5, no. 3 (2013): 35–52. http://dx.doi.org/10.4018/jdcf.2013070103.
Full textDr., Alungat Barbara (PhD). "The Current Responses by the Uganda Police Force in Enhancing Urban Peace Enforcement in Uganda; A Case of Kampala City." International Journal of Social Science And Human Research 06, no. 05 (2023): 2666–78. https://doi.org/10.5281/zenodo.7908339.
Full textPravin, Kumar, and Neelam. "Real-time pixel pattern analysis for deepfake detection: Unveiling eye blinking dynamics in live video streams." International Journal of Trends in Emerging Research and Development 2, no. 3 (2024): 13–16. https://doi.org/10.5281/zenodo.12516486.
Full textPoliakov, Igor. "Defense Versions in Modern Forensics: Concept and Types." Siberian Criminal Process and Criminalistic Readings, no. 2 (44) (July 5, 2024): 87–94. https://doi.org/10.17150/2411-6122.2024.2.87-94.
Full textFléron, René W. "Satellite Forensics: Analysing Sparse Beacon Data to Reveal the Fate of DTUsat-2." International Journal of Aerospace Engineering 2019 (May 5, 2019): 1–12. http://dx.doi.org/10.1155/2019/8428167.
Full textHagen, Raymond André. "Computational Forensics: The Essential Role of Logs in APT and Advanced Cyberattack Response." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 547–54. https://doi.org/10.34190/iccws.20.1.3328.
Full textBezerra, Islan Amorim, Rubens Karman Paula da Silva, Sidney Marlon Lopes De Lima, Sergio Murilo Maciel Fernandes, Carolina de Lira Matos, and Jheklos Gomes Da Silva. "DEJAVU FORENSICS: ENHANCING RECOVERY OF FORMATTED JPEG AND PNG DATA USING SUPPORT VECTOR MACHINES." ARACÊ 7, no. 3 (2025): 15398–434. https://doi.org/10.56238/arev7n3-301.
Full textQureshi, Shavez Mushtaq, Atif Saeed, Sultan H. Almotiri, Farooq Ahmad, and Mohammed A. Al Ghamdi. "Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media." PeerJ Computer Science 10 (May 27, 2024): e2037. http://dx.doi.org/10.7717/peerj-cs.2037.
Full textStefanov, D. S. "DETECTION AND PREVENTION OF CRIMES IN HIGHER EDUCATIONAL INSTITUTIONS." Herald of criminal justice, no. 3-4 (2023): 332–47. https://doi.org/10.17721/2413-5372.2023.3-4/332-347.
Full textSeema, Bagchi (Chattaraj), Chakrabortty Ashutosh, K. Kuila D., and Chandra Lahiri Sujit. "Comparison of the composition profiles of the low explosives in India from forensic exhibits and a brief discussion on preventive forensic techniques." Journal of Indian Chemical Society 93, Jul 2016 (2016): 889–906. https://doi.org/10.5281/zenodo.5639449.
Full textEmre, Caglar Hosgor. "Detection and Mitigation of Anti-Forensics." December 31, 2020. https://doi.org/10.5281/zenodo.4425258.
Full text