Forensics

Results: 1448



#Item
201

CprE 536: Computer and Network Forensics Cyber-attack prevention, detection, response, and investigation with the goals of counteracting cybercrime, cyberterrorism, and cyberpredators, and making the responsible persons/

Add to Reading List

Source URL: www.iac.iastate.edu

Language: English - Date: 2014-01-28 12:04:31
    202

    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBERScantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes

    Add to Reading List

    Source URL: users.encs.concordia.ca

    Language: English - Date: 2013-08-05 10:55:12
      203

      The 11th IWDW, International Workshop on Digital-forensics and Watermarking (IWDWis a premier forum for researchers and practitioners working on novel research,

      Add to Reading List

      Source URL: iwdw2014.ntub.edu.tw

      Language: English - Date: 2014-03-05 03:13:03
        204

        The Economics of Digital Forensics Tyler Moore Computer Laboratory, University of Cambridge 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom

        Add to Reading List

        Source URL: www.econinfosec.org

        Language: English - Date: 2006-07-20 16:57:22
          205

          W i n d o w s Ti m e R u l e s $ S T D I N F O Windows Forensic Analysis P o s t e r

          Add to Reading List

          Source URL: digital-forensics.sans.org

          Language: English - Date: 2015-10-08 14:18:34
            206

            Comparative Bullet Lead Analysis: A Case Study in Flawed Forensics If this technique had not been used for years to send people to prison, no reasonable scholars of forensic evidence would consider it ready for court.1

            Add to Reading List

            Source URL: www.nlada.org

            Language: English - Date: 2012-05-16 14:16:43
              207

              708 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 CAST: Canvass Audits by Sampling and Testing Philip B. Stark

              Add to Reading List

              Source URL: www.stat.berkeley.edu

              Language: English - Date: 2009-12-14 13:22:08
                208

                Memory Acquisition Remember to open command prompt as Administrator Win32dd / Win64dd (x86 / x64 systems respectively) /f Image destination and filename

                Add to Reading List

                Source URL: digital-forensics.sans.org

                Language: English - Date: 2015-08-20 15:15:30
                  209

                  2013 年 2 月 8 日 各位 Payment Card Forensics 株 式 会 社 代表取締役社長 野﨑 周作 東 京 都 港 区 港 南

                  Add to Reading List

                  Source URL: www.pcf.co.jp

                  Language: Japanese - Date: 2014-09-18 00:49:50
                    210

                    Agenda at a Glance Organization Abbreviations DC3: DoD Cyber Crime Center DCFL: Defense Computer Forensics Laboratory DCITA: Defense Cyber Investigations Training Academy

                    Add to Reading List

                    Source URL: apps.technologyforums.com

                    Language: English
                      UPDATE