9,084 resources related to Forensics
- Topics related to Forensics
- IEEE Organizations related to Forensics
- Conferences related to Forensics
- Periodicals related to Forensics
- Most published Xplore authors for Forensics
Accelerate application of breakthrough improvements in human factors, technology, and managing systems that reduce risk of electrical injuries Stimulate innovation in overcoming barriers Change and advance the electrical safety culture to enable sustainable improvements in prevention of electrical accidents and injuries
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
Flagship conference of the robotics and automation society, a premiere international venue for international robotics researchers
ICASSP is the world’s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class presentations by internationally renowned speakers, cutting-edge session topics and provide a fantastic opportunity to network with like-minded professionals from around the world.
Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...
Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...
Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.
2017 International Conference on Computer Science and Engineering (UBMK), 2017
Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person ...
2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010
Traditional computer forensics is performed towards physical machines, using a set of forensic tools to acquire disk images and memory dumps. But it is much more different to deal with virtual machines. Live forensics is used to acquire volatile data and improve efficiency, but how to perform live forensics on a subject system with virtual machines hosted in? This paper ...
2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017
Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether ...
2012 European Intelligence and Security Informatics Conference, 2012
Proactive digital forensics is a phase within the digital forensics lifecycle that deals with pre-incident preparation. Despite the increasing research on the pre-incident side of forensic investigations, little steps have been taken towards standardizing and regulating the process. This paper expresses the need for the standardization of the proactive forensics domain and argues that the first step towards the realization ...
2017 3rd International Conference on Electrical Information and Communication Technology (EICT), 2017
At recent time, cybercrime has increased significantly in the world and also in Bangladesh due to consequence of massive digitalization efforts in every sector. These types of offense require systematic probing in order to be revealed properly at the court of law. This research work proposed a comprehensive digital forensics framework to facilitate forensically ready common standard digital forensics to ...
George Oikonomou’s Paper: Traffic Forensics for IPv6-Based Wireless Sensor Networks and the IoT: WF-IoT 2016
ICASSP 2010 - New Signal Processing Application Areas
Tech News on IEEE.tv
Life Sciences: Surface Enhanced Raman Spectroscopy, and more
Lighting the Way: Optical Sensors in the Life Sciences
Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person have a large share in assessing cases in the field of digital forensics. In this paper, standardization process of biometric data is presented. At the same time, the standardization of biometric data has been examined in terms of digital forensics.
Traditional computer forensics is performed towards physical machines, using a set of forensic tools to acquire disk images and memory dumps. But it is much more different to deal with virtual machines. Live forensics is used to acquire volatile data and improve efficiency, but how to perform live forensics on a subject system with virtual machines hosted in? This paper discusses how virtual machines can be used both as forensic evidence and tools, proposes methods of how to collect data associated with virtual machines from the host system, and discusses methods and tools of how to boot the acquired subject system OS into a virtual machine.
Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether the crime is large or small. Among these devices, mobile phones take an important place in digital forensics because of their widely usages by every individual. The importance of examining of the data called as evidence in mobile phones has increased with advances in technology, operation capacity, storage capacity and functionality. In a forensics case, mobile phones must be examined by authorized persons and the data obtained from the device must be brought to standards that can be used forensically. In this study, examination and analysis of mobile phones in terms of digital forensics is evaluated. At the same time, data that can be obtained from mobile phones through a sample application has been investigated.
Proactive digital forensics is a phase within the digital forensics lifecycle that deals with pre-incident preparation. Despite the increasing research on the pre-incident side of forensic investigations, little steps have been taken towards standardizing and regulating the process. This paper expresses the need for the standardization of the proactive forensics domain and argues that the first step towards the realization of a unified standard is the identification and evaluation of current proactive initiatives.
At recent time, cybercrime has increased significantly in the world and also in Bangladesh due to consequence of massive digitalization efforts in every sector. These types of offense require systematic probing in order to be revealed properly at the court of law. This research work proposed a comprehensive digital forensics framework to facilitate forensically ready common standard digital forensics to the investigators. The framework recommended proactive and reactive forensics to enable live and post forensics issues. The purpose of the proposed framework is to allow systematic postmortem of digital forensics. Moreover, it allows further investigations suggested during examination or analysis phase. An expert system is introduced into the framework to improve efficiency through inference engine. This assistive system included digital forensics case database as a history keeper to store all documentations and results of the accomplished forensics examination. The inference engine is expected to generate a priority list from the historical data by a proposed algorithm. In addition, the expert system is expected to guide examiners during forensics. Furthermore, dissemination of forensics outcomes anticipated automatically to the authorized investigators by this system. However, the proposed framework is based on theoretical approach which is expected to be evaluated and implemented using assistive expert system in the future.
Memory Forensics becomes indispensable in Cyber Forensics Investigation as Random Access Memory or Physical Memory of a Computer holds crucial evidence which is nowhere available on Hard Disks or in other non-volatile storage media. This is because, nowadays most of the malwares are memory resident which leaves no footprints in Hard Disk storage. In this paper, a novel methodology is described for efficiently reconstructing executables from memory dumps acquired from ×86 and ×64 Windows 7 systems. This reconstruction process is challenging because different sections of the executables reside in different memory pages and thus in different locations in the acquired memory dump file. The reconstructed executables may provide crucial information in a cyber crime investigation, especially in the case of malware based crimes. The same methodology can be extended for recovering packed malware executables.
With the rapidly growth of mobile technology, the lifestyle of people is becoming reliant on various mobile devices like smartphones, tablets and so on. By using these mobile devices, users can perform transactions such as purchasing goods, making bank transaction and paying for tickets and coupons. It may bring flexibility and convenience for communication, storing and sharing data, social media networks and entertainments. On the other side, criminals may commit the crimes by using Android devices. Therefore, the investigators need to prepare enough Android forensics tools for investigation and analysis. In this paper, we proposed the applicable tool (ANDROSICS) for Android forensics which emphasizes on evidence data collection process. This tool can support Live Forensics, Dead Forensics, Data Collection, Bypass Screen Lock, Imaging, Android Debug Bridge Utility, Virtual Keys and many forensic features.
Digital evidence gradually turns into a new type lawsuit evidence. The research on digital forensics technologies focus on evidence search, recovery and data analysis, while legality, authenticity and integrality of forensics process doesn't get supervised. In this paper, on the basis of forensic steps and process research, the author intends to illustrate modeling social auditing work and designing a system to monitor digital forensics verification workflow to solve the problem of chain of custody in the process of digital evidence acquisition, transfer, storage and analysis.
This paper presents a new geometrical feature based on iris geometry for automatic children detection in digital images. The proposed feature is based on simple geometrical measures of face elements and especially iris. Iris outer boundary is approximated as a circle and the proposed feature is defined using the iris area and the distance of iris from mouth line. This approach is compared with two similar geometrical features. Experimental results show the superiority of the proposed feature over the existing ones. The proposed feature is more robust compared to the existing features that use geometrical information from human faces and gives better classification results, useful to digital forensics applications.
Part I of this two-part paper proposed a robust way to detect local points on linear-isophote surface in an image. Only a subset of these points corresponds to linear surface in image irradiance and provides useful information about the camera response function (CRF). In Part II, we show that, for some images, this subset of linear points could constitute a very small portion of the candidate set and the remaining points are often considered as noise. Our previous approach was to eliminate the noise using a learning-based method. The learning-based method could only reduce the noise but not eliminate it completely. Hence, it fails when the proportion of linear points is too small. As a main contribution in Part II, we introduce the concept of edge profile and consider the candidate points as discrete samples of an edge profile. Instead of eliminating the unwanted candidate points as noise, we use them to instantiate the edge profiles. Assuming that every edge profile has a linear component in image irradiance, the interactions of the edge profiles in the space of linear geometric invariants may correspond to the linear part which is CRF-indicating. Such a model is shown to be sound and effective in both simulation images and real camera images.
No standards are currently tagged "Forensics"
Embedded Communications System Software/Firmware Analyst - CIPHER
Georgia Tech Research Institute (GTRI)
Associate/Assistant Professor - Cybersecurity Assurance and Policy Center Cohort
Morgan State University
Senior SAP Cybersecurity Engineer
Noble Gas Mass Spectrometry - Postdoctoral Researcher
Lawrence Livermore National Laboratory
Security Researcher Student Co-op/Intern - Fall 2019 - CIPHER
Georgia Tech Research Institute (GTRI)
Research Scientist - Science & Engineering
Lawrence Livermore National Laboratory
Lawrence Livermore National Laboratory
Lawrence Livermore National Laboratory
Tier 2 Canada Research Chair (CRC) - Computer Security
Simon Fraser University