Artigos de revistas sobre o tema "Forensics and counter-forensics"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Forensics and counter-forensics".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Premanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.
Texto completo da fonteDOVHAN, O., and T. TKACHUK. "Combating counter-forensics as a component of digital security of critical infrastructure of Ukraine." INFORMATION AND LAW, no. 2(53) (June 24, 2025): 115–25. https://doi.org/10.37750/2616-6798.2025.2(53).334135.
Texto completo da fonteKeenan, Thomas. "Counter-forensics and Photography." Grey Room 55 (April 2014): 58–77. http://dx.doi.org/10.1162/grey_a_00141.
Texto completo da fonteKang, Xiangui, Jingxian Liu, Hongmei Liu, and Z. Jane Wang. "Forensics and counter anti-forensics of video inter-frame forgery." Multimedia Tools and Applications 75, no. 21 (2015): 13833–53. http://dx.doi.org/10.1007/s11042-015-2762-7.
Texto completo da fonteYang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (2020): 9. http://dx.doi.org/10.3390/jimaging6030009.
Texto completo da fonteIrons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.
Texto completo da fonteAmit, Kapoor, and Vinod Mahor Prof. "Broadcasting Forensics Using Machine Learning Approaches." International Journal of Trend in Scientific Research and Development 7, no. 3 (2023): 1034–45. https://doi.org/10.5281/zenodo.8068297.
Texto completo da fonteAhmed, Abdulghani Ali, Khalid Farhan, Waheb A. Jabbar, Abdulaleem Al-Othmani, and Abdullahi Gara Abdulrahman. "IoT Forensics: Current Perspectives and Future Directions." Sensors 24, no. 16 (2024): 5210. http://dx.doi.org/10.3390/s24165210.
Texto completo da fonteFuller, Matthew, and Nikita Mazurov. "A Counter-Forensic Audit Trail: Disassembling the Case of The Hateful Eight." Theory, Culture & Society 36, no. 6 (2019): 171–96. http://dx.doi.org/10.1177/0263276419840418.
Texto completo da fonteImeri Saiti, Deshira, Mentor Hamiti, and Jehona Asani. "Handling Data Security in Education." International Journal of Education & Well-Being 2, no. 2 (2024): 108–22. https://doi.org/10.62416/ijwb-41.
Texto completo da fonteIqbal, Saima, Wilayat Khan, Abdulrahman Alothaim, Aamir Qamar, Adi Alhudhaif, and Shtwai Alsubai. "Proving Reliability of Image Processing Techniques in Digital Forensics Applications." Security and Communication Networks 2022 (March 31, 2022): 1–17. http://dx.doi.org/10.1155/2022/1322264.
Texto completo da fonteElliethy, Ahmed. "Neural noiseprint transfer: a generic noiseprint-based counter forensics framework." PeerJ Computer Science 9 (April 27, 2023): e1359. http://dx.doi.org/10.7717/peerj-cs.1359.
Texto completo da fonteMuthusamy, Dr P., Shanmugam V, Kapilsurya R, and Saran Kumar R. "Python-Based Security Operations Center (SOC) and Forensics Analysis for Incident Cyber Threats." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2592–96. http://dx.doi.org/10.22214/ijraset.2024.60403.
Texto completo da fonteChlebowicz, Piotr, and Tomasz Safjański. "Considerations Regarding the Typology of Counter-Detection Measures in the Light of Quantitative Research on Organised Crime Groups that Recruit Football Hooligans." Białostockie Studia Prawnicze 29, no. 4 (2024): 161–82. https://doi.org/10.15290/bsp.2024.29.04.10.
Texto completo da fonteKenneth Chukwujekwu Nwafor, Ivan Zziwa, Daniel O. T. Ihenacho, and Oladele J Adeyeye. "Innovative approaches in complex data forensics: error rate assessment and its impact on cybersecurity." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 1772–92. http://dx.doi.org/10.30574/wjarr.2024.24.1.3212.
Texto completo da fonteKenneth, Chukwujekwu Nwafor, Zziwa Ivan, O. T. Ihenacho Daniel, and J. Adeyeye Oladele. "Innovative approaches in complex data forensics: error rate assessment and its impact on cybersecurity." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 1772–92. https://doi.org/10.5281/zenodo.15045230.
Texto completo da fonteStevanović, Miroslav, and Dragan Đurđević. "The role of computer forensics in the fight against terrorism." Megatrend revija 17, no. 1 (2020): 129–42. http://dx.doi.org/10.5937/megrev2001129s.
Texto completo da fonteBaracchi, Daniele, Dasara Shullani, Massimo Iuliani, Damiano Giani, and Alessandro Piva. "Camera Obscura: Exploiting in-camera processing for image counter forensics." Forensic Science International: Digital Investigation 38 (September 2021): 301213. http://dx.doi.org/10.1016/j.fsidi.2021.301213.
Texto completo da fonteDe Rosa, Alessia, Marco Fontani, Matteo Massai, Alessandro Piva, and Mauro Barni. "Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics." IEEE Signal Processing Letters 22, no. 8 (2015): 1132–36. http://dx.doi.org/10.1109/lsp.2015.2389241.
Texto completo da fonteDoyoddorj, Munkhbaatar, and Kyung-Hyune Rhee. "A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection." KIPS Transactions on Computer and Communication Systems 3, no. 5 (2014): 163–72. http://dx.doi.org/10.3745/ktccs.2014.3.5.163.
Texto completo da fonteVenkata, Udaya Sameer, and Ruchira Naskar. "Blind Image Source Device Identification." International Journal of Information Security and Privacy 12, no. 3 (2018): 84–99. http://dx.doi.org/10.4018/ijisp.2018070105.
Texto completo da fonteMehrish, Ambuj, A. V. Subramanyam, and Sabu Emmanuel. "Joint Spatial and Discrete Cosine Transform Domain-Based Counter Forensics for Adaptive Contrast Enhancement." IEEE Access 7 (2019): 27183–95. http://dx.doi.org/10.1109/access.2019.2901345.
Texto completo da fonteRamirez, Fanny. "The digital divide in the US criminal justice system." New Media & Society 24, no. 2 (2022): 514–29. http://dx.doi.org/10.1177/14614448211063190.
Texto completo da fonteŁabuz, Paweł, and Tomasz Safjański. "Counter-detection activities of criminal organizations aimed at reducing the effectiveness of surveillance conducted as part of operational activities." Issues of Forensic Science 298 (2017): 62–68. http://dx.doi.org/10.34836/pk.2017.298.3.
Texto completo da fonteSorokin, Siim. "Plausibility Under Duress: Counter-Narrative, Suspicion and Folk Forensic Contra-Plotting." Narrative Works 13, no. 1 (2024): 127–47. https://doi.org/10.7202/1115727ar.
Texto completo da fonteŁabuz, Paweł, and Tomasz Safjański. "Counter-detection activities of criminal groups aimed at limiting the effectiveness of operational and procedural control and interception of conversations." Issues of Forensic Science 297 (2017): 72–78. http://dx.doi.org/10.34836/pk.2017.297.4.
Texto completo da fonteDave, Aparna, Pearl Gupta, Manpreet Arora, and Pulin Saluja. "Dental Record-keeping: Reviving the Importance." Indian Journal of Dental Sciences 17, no. 1 (2025): 38–41. https://doi.org/10.4103/ijds.ijds_123_24.
Texto completo da fonteManisha, Chang-Tsun Li, Xufeng Lin, and Karunakar A. Kotegar. "Beyond PRNU: Learning Robust Device-Specific Fingerprint for Source Camera Identification." Sensors 22, no. 20 (2022): 7871. http://dx.doi.org/10.3390/s22207871.
Texto completo da fonteVenkatesh, M. "A Novel Digital Audio Encryption and Watermarking Scheme." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem.ncft044.
Texto completo da fonteVenkatesh, M. "A Novel Digital Audio Encryption and Watermarking Scheme." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem.ncft043.
Texto completo da fonteSMUSHKIN, A. B. "FORENSICS IN DIGITAL WORLDS (USING THE EXAMPLE OF ONLINE GAMES)." Vestnik Tomskogo gosudarstvennogo universiteta, no. 502 (2024): 214–19. https://doi.org/10.17223/15617793/502/22.
Texto completo da fonteSudjayanti, Shafa alya, and Dani Hamdani. "Digital Forensic Analysis Of APK Files In Phishing Scams On Whatsapp Using The NIST Method." Brilliance: Research of Artificial Intelligence 4, no. 1 (2024): 100–110. http://dx.doi.org/10.47709/brilliance.v4i1.3800.
Texto completo da fonteMulla, A. S. "Real-Time Cyber Security Protection Tool." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 183–86. https://doi.org/10.22214/ijraset.2025.65807.
Texto completo da fonteKerrakchou, Imane, Adil Abou El Hassan, Sara Chadli, Mohamed Emharraf, and Mohammed Saber. "Selection of efficient machine learning algorithm on Bot-IoT dataset for intrusion detection in internet of things networks." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 3 (2023): 1784. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1784-1793.
Texto completo da fonteV, Dreshpak, Prokopovych-Tkachenko D, and Rybalchenko L. "Comprehensive digital image analysis to detect manipulation." Artificial Intelligence 30, AI.2025.30(1) (2025): 77–83. https://doi.org/10.15407/jai2025.01.077.
Texto completo da fonteKruchinina, N. V. "Criminalistic Implementation of Counteraction to the Use of Biotechnologies in the event of Commission of Criminal Offences". Lex Russica, № 2 (28 лютого 2022): 101–7. http://dx.doi.org/10.17803/1729-5920.2022.183.2.101-107.
Texto completo da fonteKowalski, Marcin, and Krzysztof Mierzejewski. "Detection of 3D face masks with thermal infrared imaging and deep learning techniques." Photonics Letters of Poland 13, no. 2 (2021): 22. http://dx.doi.org/10.4302/plp.v13i2.1091.
Texto completo da fonteJournal, IJSREM. "Deep Fake Face Detection Using Deep Learning Tech with LSTM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28624.
Texto completo da fonteGarcia, Jan Mark. "Exploring Deepfakes and Effective Prevention Strategies: A Critical Review." Psychology and Education: A Multidisciplinary Journal 33, no. 1 (2025): 93–96. https://doi.org/10.70838/pemj.330107.
Texto completo da fonteBarni, Mauro, Marco Fontani, and Benedetta Tondi. "A Universal Attack Against Histogram-Based Image Forensics." International Journal of Digital Crime and Forensics 5, no. 3 (2013): 35–52. http://dx.doi.org/10.4018/jdcf.2013070103.
Texto completo da fonteDr., Alungat Barbara (PhD). "The Current Responses by the Uganda Police Force in Enhancing Urban Peace Enforcement in Uganda; A Case of Kampala City." International Journal of Social Science And Human Research 06, no. 05 (2023): 2666–78. https://doi.org/10.5281/zenodo.7908339.
Texto completo da fontePravin, Kumar, and Neelam. "Real-time pixel pattern analysis for deepfake detection: Unveiling eye blinking dynamics in live video streams." International Journal of Trends in Emerging Research and Development 2, no. 3 (2024): 13–16. https://doi.org/10.5281/zenodo.12516486.
Texto completo da fontePoliakov, Igor. "Defense Versions in Modern Forensics: Concept and Types." Siberian Criminal Process and Criminalistic Readings, no. 2 (44) (July 5, 2024): 87–94. https://doi.org/10.17150/2411-6122.2024.2.87-94.
Texto completo da fonteFléron, René W. "Satellite Forensics: Analysing Sparse Beacon Data to Reveal the Fate of DTUsat-2." International Journal of Aerospace Engineering 2019 (May 5, 2019): 1–12. http://dx.doi.org/10.1155/2019/8428167.
Texto completo da fonteHagen, Raymond André. "Computational Forensics: The Essential Role of Logs in APT and Advanced Cyberattack Response." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 547–54. https://doi.org/10.34190/iccws.20.1.3328.
Texto completo da fonteBezerra, Islan Amorim, Rubens Karman Paula da Silva, Sidney Marlon Lopes De Lima, Sergio Murilo Maciel Fernandes, Carolina de Lira Matos, and Jheklos Gomes Da Silva. "DEJAVU FORENSICS: ENHANCING RECOVERY OF FORMATTED JPEG AND PNG DATA USING SUPPORT VECTOR MACHINES." ARACÊ 7, no. 3 (2025): 15398–434. https://doi.org/10.56238/arev7n3-301.
Texto completo da fonteQureshi, Shavez Mushtaq, Atif Saeed, Sultan H. Almotiri, Farooq Ahmad, and Mohammed A. Al Ghamdi. "Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media." PeerJ Computer Science 10 (May 27, 2024): e2037. http://dx.doi.org/10.7717/peerj-cs.2037.
Texto completo da fonteStefanov, D. S. "DETECTION AND PREVENTION OF CRIMES IN HIGHER EDUCATIONAL INSTITUTIONS." Herald of criminal justice, no. 3-4 (2023): 332–47. https://doi.org/10.17721/2413-5372.2023.3-4/332-347.
Texto completo da fonteSeema, Bagchi (Chattaraj), Chakrabortty Ashutosh, K. Kuila D., and Chandra Lahiri Sujit. "Comparison of the composition profiles of the low explosives in India from forensic exhibits and a brief discussion on preventive forensic techniques." Journal of Indian Chemical Society 93, Jul 2016 (2016): 889–906. https://doi.org/10.5281/zenodo.5639449.
Texto completo da fonteEmre, Caglar Hosgor. "Detection and Mitigation of Anti-Forensics." December 31, 2020. https://doi.org/10.5281/zenodo.4425258.
Texto completo da fonte