Digital forensics and forensic investigations: breakthroughs in research and practice
"This book addresses current challenges and issues emerging in cyber forensics and new investigative tools and methods that can be adopted and implemented to address these issues and counter security breaches within various organizations. It also examines legal perspectives including procedures...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 Volltext |
Zusammenfassung: | "This book addresses current challenges and issues emerging in cyber forensics and new investigative tools and methods that can be adopted and implemented to address these issues and counter security breaches within various organizations. It also examines legal perspectives including procedures for cyber investigations, standards, and policies"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781799830269 |
DOI: | 10.4018/978-1-7998-3025-2 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046691723 | ||
003 | DE-604 | ||
005 | 20211108 | ||
007 | cr|uuu---uuuuu | ||
008 | 200423s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781799830269 |9 978-1-7998-3026-9 | ||
035 | |a (OCoLC)1152241026 | ||
035 | |a (DE-599)BVBBV046691723 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Digital forensics and forensic investigations |b breakthroughs in research and practice |c Information Resources Management Association, USA |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Section 1. Detection. Chapter 1. Evaluation of kernel based Atanassov's intuitionistic fuzzy clustering for network forensics and intrusion detection ; Chapter 2. On cloud data transaction security using encryption and intrusion detection ; Chapter 3. An overview on passive image forensics technology for automatic computer forgery ; Chapter 4. Detection of seam-carving image based on Benford's law for forensic applications ; Chapter 5. A universal image forensics of smoothing filtering ; Chapter 6. Digital image splicing detection based on Markov features in QDCT and QWT domain ; Chapter 7. Digital image forensics based on CFA interpolation feature and gaussian mixture model ; Chapter 8. An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 9. Blind detection of partial-color-manipulation based on self-PRNU estimation ; Chapter 10. Copy-move forgery detection using DyWT ; Chapter 11. | |
505 | 8 | |a Fast and effective copy-move detection of digital audio based on auto segment -- | |
505 | 8 | |a Section 2. Investigation and evidence. Chapter 12. Cyber criminal profiling ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. A socio-technical perspective on threat intelligence informed digital forensic readiness ; Chapter 15. Investigation approach for network attack intention recognition ; Chapter 16. Blind image source device identification: practicality and challenges ; Chapter 17. Forensic investigation of digital crimes in healthcare applications ; Chapter 18. Digital evidence in practice: procedure and tools ; Chapter 19. A knowledge model of digital evidence review elements based on ontology ; Chapter 20. Forensic technologies in the courtroom: a multi-disciplinary analysis ; Chapter 21. Iphone forensics: recovering investigative evidence using chip-off method ; Chapter 22. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 23. | |
505 | 8 | |a A study of forensic imaging to evaluate "unsanitized" destination storage media ; Chapter 24. Tampering localization in double compressed images by investigating noise quantization -- | |
505 | 8 | |a Section 3. Methods, tools, and techniques. Chapter 25. Exploring myths in digital forensics: separating science from ritual ; Chapter 26. Understanding anti-forensics techniques for combating digital security breaches and criminal activity ; Chapter 27. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 28. Monitor and detect suspicious transactions with database forensic analysis ; Chapter 29. Digital forensic and machine learning ; Chapter 30. A new timestamp digital forensic method using a modified superincreasing sequence ; Chapter 31. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 32. Research on digital forensics based on Uyghur web text classification ; Chapter 33. Ontology-based smart sound digital forensics analysis for web services ; Chapter 34. Fingerprint image hashing based on minutiae points and shape context ; Chapter 35. | |
505 | 8 | |a An Australian longitudinal study into remnant data recovered from second-hand memory cards | |
520 | |a "This book addresses current challenges and issues emerging in cyber forensics and new investigative tools and methods that can be adopted and implemented to address these issues and counter security breaches within various organizations. It also examines legal perspectives including procedures for cyber investigations, standards, and policies"-- | ||
650 | 4 | |a Digital forensic science | |
650 | 7 | |a Digital forensic science |2 fast | |
710 | 2 | |a Information Resources Management Association |0 (DE-588)5010976-5 |4 isb | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-7998-3025-2 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-3025-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://doi.org/10.4018/978-1-7998-3025-2 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-3025-2 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-3025-2 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-3025-2 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805076706231320576 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
building | Verbundindex |
bvnumber | BV046691723 |
collection | ZDB-98-IGB |
contents | Section 1. Detection. Chapter 1. Evaluation of kernel based Atanassov's intuitionistic fuzzy clustering for network forensics and intrusion detection ; Chapter 2. On cloud data transaction security using encryption and intrusion detection ; Chapter 3. An overview on passive image forensics technology for automatic computer forgery ; Chapter 4. Detection of seam-carving image based on Benford's law for forensic applications ; Chapter 5. A universal image forensics of smoothing filtering ; Chapter 6. Digital image splicing detection based on Markov features in QDCT and QWT domain ; Chapter 7. Digital image forensics based on CFA interpolation feature and gaussian mixture model ; Chapter 8. An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 9. Blind detection of partial-color-manipulation based on self-PRNU estimation ; Chapter 10. Copy-move forgery detection using DyWT ; Chapter 11. Fast and effective copy-move detection of digital audio based on auto segment -- Section 2. Investigation and evidence. Chapter 12. Cyber criminal profiling ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. A socio-technical perspective on threat intelligence informed digital forensic readiness ; Chapter 15. Investigation approach for network attack intention recognition ; Chapter 16. Blind image source device identification: practicality and challenges ; Chapter 17. Forensic investigation of digital crimes in healthcare applications ; Chapter 18. Digital evidence in practice: procedure and tools ; Chapter 19. A knowledge model of digital evidence review elements based on ontology ; Chapter 20. Forensic technologies in the courtroom: a multi-disciplinary analysis ; Chapter 21. Iphone forensics: recovering investigative evidence using chip-off method ; Chapter 22. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 23. A study of forensic imaging to evaluate "unsanitized" destination storage media ; Chapter 24. Tampering localization in double compressed images by investigating noise quantization -- Section 3. Methods, tools, and techniques. Chapter 25. Exploring myths in digital forensics: separating science from ritual ; Chapter 26. Understanding anti-forensics techniques for combating digital security breaches and criminal activity ; Chapter 27. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 28. Monitor and detect suspicious transactions with database forensic analysis ; Chapter 29. Digital forensic and machine learning ; Chapter 30. A new timestamp digital forensic method using a modified superincreasing sequence ; Chapter 31. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 32. Research on digital forensics based on Uyghur web text classification ; Chapter 33. Ontology-based smart sound digital forensics analysis for web services ; Chapter 34. Fingerprint image hashing based on minutiae points and shape context ; Chapter 35. An Australian longitudinal study into remnant data recovered from second-hand memory cards |
ctrlnum | (OCoLC)1152241026 (DE-599)BVBBV046691723 |
doi_str_mv | 10.4018/978-1-7998-3025-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV046691723</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211108</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200423s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799830269</subfield><subfield code="9">978-1-7998-3026-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1152241026</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046691723</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital forensics and forensic investigations</subfield><subfield code="b">breakthroughs in research and practice</subfield><subfield code="c">Information Resources Management Association, USA</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 1. Detection. Chapter 1. Evaluation of kernel based Atanassov's intuitionistic fuzzy clustering for network forensics and intrusion detection ; Chapter 2. On cloud data transaction security using encryption and intrusion detection ; Chapter 3. An overview on passive image forensics technology for automatic computer forgery ; Chapter 4. Detection of seam-carving image based on Benford's law for forensic applications ; Chapter 5. A universal image forensics of smoothing filtering ; Chapter 6. Digital image splicing detection based on Markov features in QDCT and QWT domain ; Chapter 7. Digital image forensics based on CFA interpolation feature and gaussian mixture model ; Chapter 8. An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 9. Blind detection of partial-color-manipulation based on self-PRNU estimation ; Chapter 10. Copy-move forgery detection using DyWT ; Chapter 11.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Fast and effective copy-move detection of digital audio based on auto segment --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 2. Investigation and evidence. Chapter 12. Cyber criminal profiling ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. A socio-technical perspective on threat intelligence informed digital forensic readiness ; Chapter 15. Investigation approach for network attack intention recognition ; Chapter 16. Blind image source device identification: practicality and challenges ; Chapter 17. Forensic investigation of digital crimes in healthcare applications ; Chapter 18. Digital evidence in practice: procedure and tools ; Chapter 19. A knowledge model of digital evidence review elements based on ontology ; Chapter 20. Forensic technologies in the courtroom: a multi-disciplinary analysis ; Chapter 21. Iphone forensics: recovering investigative evidence using chip-off method ; Chapter 22. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 23.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A study of forensic imaging to evaluate "unsanitized" destination storage media ; Chapter 24. Tampering localization in double compressed images by investigating noise quantization --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 3. Methods, tools, and techniques. Chapter 25. Exploring myths in digital forensics: separating science from ritual ; Chapter 26. Understanding anti-forensics techniques for combating digital security breaches and criminal activity ; Chapter 27. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 28. Monitor and detect suspicious transactions with database forensic analysis ; Chapter 29. Digital forensic and machine learning ; Chapter 30. A new timestamp digital forensic method using a modified superincreasing sequence ; Chapter 31. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 32. Research on digital forensics based on Uyghur web text classification ; Chapter 33. Ontology-based smart sound digital forensics analysis for web services ; Chapter 34. Fingerprint image hashing based on minutiae points and shape context ; Chapter 35.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">An Australian longitudinal study into remnant data recovered from second-hand memory cards</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book addresses current challenges and issues emerging in cyber forensics and new investigative tools and methods that can be adopted and implemented to address these issues and counter security breaches within various organizations. It also examines legal perspectives including procedures for cyber investigations, standards, and policies"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital forensic science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital forensic science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Information Resources Management Association</subfield><subfield code="0">(DE-588)5010976-5</subfield><subfield code="4">isb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-7998-3025-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-3025-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-3025-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-3025-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-3025-2</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-3025-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046691723 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:25:17Z |
indexdate | 2024-07-20T06:01:33Z |
institution | BVB |
institution_GND | (DE-588)5010976-5 |
isbn | 9781799830269 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032102461 |
oclc_num | 1152241026 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Digital forensics and forensic investigations breakthroughs in research and practice Information Resources Management Association, USA Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Section 1. Detection. Chapter 1. Evaluation of kernel based Atanassov's intuitionistic fuzzy clustering for network forensics and intrusion detection ; Chapter 2. On cloud data transaction security using encryption and intrusion detection ; Chapter 3. An overview on passive image forensics technology for automatic computer forgery ; Chapter 4. Detection of seam-carving image based on Benford's law for forensic applications ; Chapter 5. A universal image forensics of smoothing filtering ; Chapter 6. Digital image splicing detection based on Markov features in QDCT and QWT domain ; Chapter 7. Digital image forensics based on CFA interpolation feature and gaussian mixture model ; Chapter 8. An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 9. Blind detection of partial-color-manipulation based on self-PRNU estimation ; Chapter 10. Copy-move forgery detection using DyWT ; Chapter 11. Fast and effective copy-move detection of digital audio based on auto segment -- Section 2. Investigation and evidence. Chapter 12. Cyber criminal profiling ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. A socio-technical perspective on threat intelligence informed digital forensic readiness ; Chapter 15. Investigation approach for network attack intention recognition ; Chapter 16. Blind image source device identification: practicality and challenges ; Chapter 17. Forensic investigation of digital crimes in healthcare applications ; Chapter 18. Digital evidence in practice: procedure and tools ; Chapter 19. A knowledge model of digital evidence review elements based on ontology ; Chapter 20. Forensic technologies in the courtroom: a multi-disciplinary analysis ; Chapter 21. Iphone forensics: recovering investigative evidence using chip-off method ; Chapter 22. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 23. A study of forensic imaging to evaluate "unsanitized" destination storage media ; Chapter 24. Tampering localization in double compressed images by investigating noise quantization -- Section 3. Methods, tools, and techniques. Chapter 25. Exploring myths in digital forensics: separating science from ritual ; Chapter 26. Understanding anti-forensics techniques for combating digital security breaches and criminal activity ; Chapter 27. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 28. Monitor and detect suspicious transactions with database forensic analysis ; Chapter 29. Digital forensic and machine learning ; Chapter 30. A new timestamp digital forensic method using a modified superincreasing sequence ; Chapter 31. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 32. Research on digital forensics based on Uyghur web text classification ; Chapter 33. Ontology-based smart sound digital forensics analysis for web services ; Chapter 34. Fingerprint image hashing based on minutiae points and shape context ; Chapter 35. An Australian longitudinal study into remnant data recovered from second-hand memory cards "This book addresses current challenges and issues emerging in cyber forensics and new investigative tools and methods that can be adopted and implemented to address these issues and counter security breaches within various organizations. It also examines legal perspectives including procedures for cyber investigations, standards, and policies"-- Digital forensic science Digital forensic science fast Information Resources Management Association (DE-588)5010976-5 isb Erscheint auch als Druck-Ausgabe, hardcover 978-1-7998-3025-2 https://doi.org/10.4018/978-1-7998-3025-2 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Digital forensics and forensic investigations breakthroughs in research and practice Section 1. Detection. Chapter 1. Evaluation of kernel based Atanassov's intuitionistic fuzzy clustering for network forensics and intrusion detection ; Chapter 2. On cloud data transaction security using encryption and intrusion detection ; Chapter 3. An overview on passive image forensics technology for automatic computer forgery ; Chapter 4. Detection of seam-carving image based on Benford's law for forensic applications ; Chapter 5. A universal image forensics of smoothing filtering ; Chapter 6. Digital image splicing detection based on Markov features in QDCT and QWT domain ; Chapter 7. Digital image forensics based on CFA interpolation feature and gaussian mixture model ; Chapter 8. An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 9. Blind detection of partial-color-manipulation based on self-PRNU estimation ; Chapter 10. Copy-move forgery detection using DyWT ; Chapter 11. Fast and effective copy-move detection of digital audio based on auto segment -- Section 2. Investigation and evidence. Chapter 12. Cyber criminal profiling ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. A socio-technical perspective on threat intelligence informed digital forensic readiness ; Chapter 15. Investigation approach for network attack intention recognition ; Chapter 16. Blind image source device identification: practicality and challenges ; Chapter 17. Forensic investigation of digital crimes in healthcare applications ; Chapter 18. Digital evidence in practice: procedure and tools ; Chapter 19. A knowledge model of digital evidence review elements based on ontology ; Chapter 20. Forensic technologies in the courtroom: a multi-disciplinary analysis ; Chapter 21. Iphone forensics: recovering investigative evidence using chip-off method ; Chapter 22. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 23. A study of forensic imaging to evaluate "unsanitized" destination storage media ; Chapter 24. Tampering localization in double compressed images by investigating noise quantization -- Section 3. Methods, tools, and techniques. Chapter 25. Exploring myths in digital forensics: separating science from ritual ; Chapter 26. Understanding anti-forensics techniques for combating digital security breaches and criminal activity ; Chapter 27. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 28. Monitor and detect suspicious transactions with database forensic analysis ; Chapter 29. Digital forensic and machine learning ; Chapter 30. A new timestamp digital forensic method using a modified superincreasing sequence ; Chapter 31. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 32. Research on digital forensics based on Uyghur web text classification ; Chapter 33. Ontology-based smart sound digital forensics analysis for web services ; Chapter 34. Fingerprint image hashing based on minutiae points and shape context ; Chapter 35. An Australian longitudinal study into remnant data recovered from second-hand memory cards Digital forensic science Digital forensic science fast |
title | Digital forensics and forensic investigations breakthroughs in research and practice |
title_auth | Digital forensics and forensic investigations breakthroughs in research and practice |
title_exact_search | Digital forensics and forensic investigations breakthroughs in research and practice |
title_exact_search_txtP | Digital forensics and forensic investigations breakthroughs in research and practice |
title_full | Digital forensics and forensic investigations breakthroughs in research and practice Information Resources Management Association, USA |
title_fullStr | Digital forensics and forensic investigations breakthroughs in research and practice Information Resources Management Association, USA |
title_full_unstemmed | Digital forensics and forensic investigations breakthroughs in research and practice Information Resources Management Association, USA |
title_short | Digital forensics and forensic investigations |
title_sort | digital forensics and forensic investigations breakthroughs in research and practice |
title_sub | breakthroughs in research and practice |
topic | Digital forensic science Digital forensic science fast |
topic_facet | Digital forensic science |
url | https://doi.org/10.4018/978-1-7998-3025-2 |
work_keys_str_mv | AT informationresourcesmanagementassociation digitalforensicsandforensicinvestigationsbreakthroughsinresearchandpractice |