Literatura científica selecionada sobre o tema "Forensics and counter-forensics"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Forensics and counter-forensics".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Forensics and counter-forensics"
Premanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.
Texto completo da fonteDOVHAN, O., and T. TKACHUK. "Combating counter-forensics as a component of digital security of critical infrastructure of Ukraine." INFORMATION AND LAW, no. 2(53) (June 24, 2025): 115–25. https://doi.org/10.37750/2616-6798.2025.2(53).334135.
Texto completo da fonteKeenan, Thomas. "Counter-forensics and Photography." Grey Room 55 (April 2014): 58–77. http://dx.doi.org/10.1162/grey_a_00141.
Texto completo da fonteKang, Xiangui, Jingxian Liu, Hongmei Liu, and Z. Jane Wang. "Forensics and counter anti-forensics of video inter-frame forgery." Multimedia Tools and Applications 75, no. 21 (2015): 13833–53. http://dx.doi.org/10.1007/s11042-015-2762-7.
Texto completo da fonteYang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (2020): 9. http://dx.doi.org/10.3390/jimaging6030009.
Texto completo da fonteIrons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.
Texto completo da fonteAmit, Kapoor, and Vinod Mahor Prof. "Broadcasting Forensics Using Machine Learning Approaches." International Journal of Trend in Scientific Research and Development 7, no. 3 (2023): 1034–45. https://doi.org/10.5281/zenodo.8068297.
Texto completo da fonteAhmed, Abdulghani Ali, Khalid Farhan, Waheb A. Jabbar, Abdulaleem Al-Othmani, and Abdullahi Gara Abdulrahman. "IoT Forensics: Current Perspectives and Future Directions." Sensors 24, no. 16 (2024): 5210. http://dx.doi.org/10.3390/s24165210.
Texto completo da fonteFuller, Matthew, and Nikita Mazurov. "A Counter-Forensic Audit Trail: Disassembling the Case of The Hateful Eight." Theory, Culture & Society 36, no. 6 (2019): 171–96. http://dx.doi.org/10.1177/0263276419840418.
Texto completo da fonteImeri Saiti, Deshira, Mentor Hamiti, and Jehona Asani. "Handling Data Security in Education." International Journal of Education & Well-Being 2, no. 2 (2024): 108–22. https://doi.org/10.62416/ijwb-41.
Texto completo da fonteTeses / dissertações sobre o assunto "Forensics and counter-forensics"
Nowroozi, Ehsan. "Machine Learning Techniques for Image Forensics in Adversarial Setting." Doctoral thesis, Università di Siena, 2020. http://hdl.handle.net/11365/1096177.
Texto completo da fonteDafale, Ninad N. "Source Anonymization Through Counter Forensics." Thesis, 2017. http://ethesis.nitrkl.ac.in/9074/1/2017_MT_NNDafale.pdf.
Texto completo da fonteLivros sobre o assunto "Forensics and counter-forensics"
Buchanan, Ben. The Defender’s View. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0004.
Texto completo da fonteCapítulos de livros sobre o assunto "Forensics and counter-forensics"
Rodger, Johnny. "Counter-forensics." In Key Essays. Routledge, 2021. http://dx.doi.org/10.4324/9781003186922-11.
Texto completo da fonteBöhme, Rainer, and Matthias Kirchner. "Counter-Forensics: Attacking Image Forensics." In Digital Image Forensics. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-0757-7_12.
Texto completo da fonteNeha Singh and Sandeep Joshi. "Digital Image Forensics and Counter Anti-forensics." In Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-2638-3_90.
Texto completo da fonteKeenan, Thomas. "Counter-forensics and photography 1." In The Routledge Companion to Photography Theory. Routledge, 2019. http://dx.doi.org/10.4324/9781315727998-19.
Texto completo da fonteLai, ShiYue, and Rainer Böhme. "Countering Counter-Forensics: The Case of JPEG Compression." In Information Hiding. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24178-9_20.
Texto completo da fonteRodrigues, Marcos A., and Alan Robinson. "Fast 3D Recognition for Forensics and Counter-Terrorism Applications." In Advanced Information and Knowledge Processing. Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2140-4_7.
Texto completo da fonteLi, Wenjie, Benedetta Tondi, Rongrong Ni, and Mauro Barni. "Increased-Confidence Adversarial Examples for Deep Learning Counter-Forensics." In Pattern Recognition. ICPR International Workshops and Challenges. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68780-9_34.
Texto completo da fonteIvascu, Lacramioara Nicoleta, and Hamid Jahankhani. "An Investigation into Counter Drones Digital Forensics Aided by Remote Identification." In Space Governance. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62228-1_7.
Texto completo da fontePic, Marc Michel, Gaël Mahfoudi, Anis Trabelsi, and Jean-Luc Dugelay. "Face Manipulation Detection in Remote Operational Systems." In Handbook of Digital Face Manipulation and Detection. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_19.
Texto completo da fonteDas, Debjit, Banalata Bhunia, Ruchira Naskar, and Rajat Subhra Chakraborty. "Linear and Non-Linear Filter-based Counter-Forensics Against Image Splicing Detection." In Communications in Computer and Information Science. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31407-0_20.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Forensics and counter-forensics"
Dang-Nguyen, D. T., I. D. Gebru, V. Conotter, G. Boato, and F. G. B. De Natale. "Counter-forensics of median filtering." In 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). IEEE, 2013. http://dx.doi.org/10.1109/mmsp.2013.6659298.
Texto completo da fonteSingamsetty, Ramu, Koneru Sai Chandra Has, Sravani Kukkapalli, Veera Narayana Mannipudi, K. V. D. Kiran, and A. V. Praveen Krishna. "Information Security Using Counter-Anti-Forensics." In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2023. http://dx.doi.org/10.1109/icaccs57279.2023.10112678.
Texto completo da fonteTailanián, Matías, Marina Gardella, Alvaro Pardo, and Pablo Musé. "Diffusion models meet image counter-forensics." In 2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). IEEE, 2024. http://dx.doi.org/10.1109/wacv57701.2024.00388.
Texto completo da fonteIuliani, M., S. Rossetto, T. Bianchi, Alessia De Rosa, A. Piva, and M. Barni. "Image counter-forensics based on feature injection." In IS&T/SPIE Electronic Imaging, edited by Adnan M. Alattar, Nasir D. Memon, and Chad D. Heitzenrater. SPIE, 2014. http://dx.doi.org/10.1117/12.2042234.
Texto completo da fonteGoljan, Miroslav, Jessica Fridrich, and Mo Chen. "Sensor noise camera identification: countering counter-forensics." In IS&T/SPIE Electronic Imaging, edited by Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III. SPIE, 2010. http://dx.doi.org/10.1117/12.839055.
Texto completo da fonteFahmy, Gamal, Abdullah Alqallaf, and Rolf Wurtz. "Phase based detection of JPEG counter forensics." In 2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS). IEEE, 2015. http://dx.doi.org/10.1109/icecs.2015.7440243.
Texto completo da fonteValenzise, G., M. Tagliasacchi, and S. Tubaro. "Detectability-quality trade-off in JPEG counter-forensics." In 2014 IEEE International Conference on Image Processing (ICIP). IEEE, 2014. http://dx.doi.org/10.1109/icip.2014.7026080.
Texto completo da fonteMarra, Francesco, Giovanni Poggi, Fabio Roli, Carlo Sansone, and Luisa Verdoliva. "Counter-forensics in machine learning based forgery detection." In IS&T/SPIE Electronic Imaging, edited by Adnan M. Alattar, Nasir D. Memon, and Chad D. Heitzenrater. SPIE, 2015. http://dx.doi.org/10.1117/12.2182173.
Texto completo da fonteDeLooze, Lori L. "Counter hack: Creating a context for a cyber forensics course." In 2008 IEEE Frontiers in Education Conference (FIE). IEEE, 2008. http://dx.doi.org/10.1109/fie.2008.4720283.
Texto completo da fonteDrescher, Adam, Brandon De Luna, Marjolein Pasman, Derek Haas, and Sheldon Landsberger. "Revamping of a Graduate Radiochemistry Course for Nuclear Forensics Applications." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-81593.
Texto completo da fonteRelatórios de organizações sobre o assunto "Forensics and counter-forensics"
Naif Arab University for Security Sciences, Centre of Excellence in Cybercrimes and Digital Forensics. Cyber-enabled Terrorism in the African and Arab Regions: Survey Report from NAUSS-UNCCT Workshop. Naif University Press, 2024. http://dx.doi.org/10.26735/iwjx5145.
Texto completo da fonte