8,396 Hits in 6.2 sec

Digital Forensic Research: The Good, the Bad and the Unaddressed [chapter]

Nicole Beebe
2009 IFIP Advances in Information and Communication Technology  
Digital forensics is a relatively new scientific discipline, but one that has matured greatly over the past decade.  ...  In synthesizing these professional opinions, several consensus views emerge that provide valuable insights into the "state of the discipline."  ...  Acknowledgements The following individuals have contributed to this assessment of the discipline of digital forensics: Frank  ... 
doi:10.1007/978-3-642-04155-6_2 fatcat:464tvjlhtjflbfoiopcuwmenoa

Visual diagnostics of an explainer model: Tools for the assessment of LIME explanations

Katherine Goode, Heike Hofmann
2021 Statistical analysis and data mining  
K E Y W O R D S black-box models, data science, explainable machine learning, interpretability, statistical graphics 1 This is an open access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs  ...  We apply the visual diagnostics to a forensics bullet matching dataset to show examples where LIME explanations depend on the tuning parameter values and the explainer model oversimplifies the black-box  ...  Machine learning models have proven to perform well in problems with the latter objective, but the accuracy of many machine learning models comes at the cost of interpretability due to their algorithmic  ... 
doi:10.1002/sam.11500 fatcat:k4gltpofx5hzrdx3o24g2bth7i

Good Enough for Government Work: The Constitutional Duty to Preserve Forensic Interviews of Child Victims

Lucy S. McGough
2002 Law & Contemporary Problems  
We do not know with any certainty how bad or good forensic interviewing practice currently is, because we lack a record of practice norms.  ...  In one proposed model statute, a child may disclaim an earlier account in whole or in part and provide a new version.  ... 
doi:10.2307/1192370 fatcat:3busjdsqlfejvppqvkz6q2wtsu

Counter-Forensics: Attacking Image Forensics [chapter]

Rainer Böhme, Matthias Kirchner
2012 Digital Image Forensics  
Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of  ...  , and the role of image models with regard to the epistemic underpinning of the forensic decision problem.  ...  It is remarkable-and somewhat reassuring from the forensic investigator's point of view-that so far no counter-forensic techniques are published against image forensics based on machine learning, such  ... 
doi:10.1007/978-1-4614-0757-7_12 fatcat:amg3sagivbd7ho4fgmg5yehwha

Visual exploration of classification models for risk assessment

Malgorzata Migut, Marcel Worring
2010 2010 IEEE Symposium on Visual Analytics Science and Technology  
In this paper we describe a framework tightly integrating interactive visual exploration with machine learning to support the decision making process.  ...  A case study on data from the Forensic Psychiatry domain reveals the usefulness of the suggested approach.  ...  ACKNOWLEDGMENTS This research is supported by the Expertise center for Forensic Psychiatry, The Netherlands.  ... 
doi:10.1109/vast.2010.5652398 dblp:conf/ieeevast/MigutW10 fatcat:pn7ptfhfyrdvlpb4727j3wxala

Use of Advanced Artificial Intelligence in Forensic Medicine, Forensic Anthropology and Clinical Anatomy

Andrej Thurzo, Helena Svobodová Kosnáčová, Veronika Kurilová, Silvester Kosmeľ, Radoslav Beňuš, Norbert Moravanský, Peter Kováč, Kristína Mikuš Kuracinová, Michal Palkovič, Ivan Varga
2021 Healthcare  
The main aim was to bridge interdisciplinary cooperation between forensic medical experts and deep learning engineers, emphasizing activating clinical forensic experts in the field with possibly basic  ...  In conclusion, 3D CNN application can be a watershed moment in forensic medicine, leading to unprecedented improvement of forensic analysis workflows based on 3D neural networks.  ...  Machine learning works based on models that mimic neurons in the brain and can learn from experiences and solve complex problems.  ... 
doi:10.3390/healthcare9111545 pmid:34828590 pmcid:PMC8619074 fatcat:wnexmx27gjfbjlri6tmy5rwkv4

Passive network forensics

John McHugh, Ron McLeod, Vagishwari Nagaonkar
2008 ACM SIGOPS Operating Systems Review  
A: yes, its hard for apps. Depending on the application, how they approach it can vary. Carts already use the model and were already good at reconciling conflicts.  ...  A: Notifications are good if you are trying to improve latency, otherwise, polling is good.  ...  SVA code is translated for execution by a virtual machine transparently, offline or online.  ... 
doi:10.1145/1368506.1368520 fatcat:mux57vw23naevdz4qqxrkz52aq

Network Analysis and Forensics [chapter]

Timothy J. Shimeall, Jonathan M. Spring
2014 Introduction to Information Security  
Sample transmission of data from one host to its destination across the network, as viewed by what OSI model layers are involved in each step.  ...  Each of flow, packet capture, IDS logs, and so on has a similar learning curve.  ... 
doi:10.1016/b978-1-59749-969-9.00011-0 fatcat:b5alyqbssvgwhccrkds5pgu2my

Digital Forensics

Sanjay Sahay
2020 Advanced Computing and Communications  
It has the potential to provide an intelligence of the functional type, which generally seems to be missing besides adding a new dimension to criminal investigation.  ...  Digital forensics is the science of recovery and investigation of material found on digital devices. It started in correlation to computer / cybercrimes.  ...  His research interests include Signal Processing, Machine Learning and Applications, Archeology etc.  ... 
doi:10.34048/2020.4.f2 fatcat:rl4pvolmr5cbndhhaprrhpslwy

Peer Instruction for Digital Forensics

William E. Johnson, Irfan Ahmed, Vassil Roussev, Cynthia Bailey Lee
2017 USENIX Security Symposium  
For this paper, we developed 108 peer instruction questions for a digital forensics curriculum, and evaluated a selection of the questions by holding a condensed computer forensics workshop for university  ...  Digital forensics can be a difficult discipline to teach effectively because of its interdisciplinary nature, closely integrating law and computer science.  ...  view of a forensic investigative scenario.  ... 
dblp:conf/uss/JohnsonARL17 fatcat:mcacsxv575eczhdafsbpcnhksu

Currency security and forensics: a survey

J. Chambers, W. Yan, A. Garhwal, M. Kankanhalli
2014 Multimedia tools and applications  
Ultimately, a robust currency is desired.  ...  Despite technological advancements, overcoming counterfeit production remains a distant future.  ...  A combination of image processing, machine learning, and pattern recognition, this software is trained to check specific security features using learned threshold values.  ... 
doi:10.1007/s11042-013-1809-x fatcat:7xqvdrf4ifeyxheuljp7fhsq5i

The Evolution of Volatile Memory Forensics

Hannah Nyholm, Kristine Monteith, Seth Lyles, Micaela Gallegos, Mark DeSantis, John Donaldson, Claire Taylor
2022 Journal of Cybersecurity and Privacy  
For memory analysis, we examined the traditional forensic methods used, including signature-based methods, dynamic methods performed in a sandbox environment, as well as machine learning-based approaches  ...  The collection and analysis of volatile memory is a vibrant area of research in the cybersecurity community.  ...  Memory forensic methods can be classified as dynamic analysis from within a sandbox, a scanning method, or a machine learning approach.  ... 
doi:10.3390/jcp2030028 fatcat:w64rxe3icfelvbrs2r2rs7lokm

Forensic and Automatic Speaker Recognition System

Satyanand Singh
2018 International Journal of Electrical and Computer Engineering (IJECE)  
of a reference model with the validity of an unknown audio sample and any suspicious individual.  ...  An algorithmbased system has been developed in the recognition of forensic speakers by physics scientists and forensic linguists to reduce the probability of a contextual bias or pre-centric understanding  ...  If this explains, then forensic experts did not have the spectrographs separating variability by intraspeaker and interspeaker by a normal view assessment.  ... 
doi:10.11591/ijece.v8i5.pp2804-2811 fatcat:7egufrmjvjbubaxhxuk2t5kcta

Computational Forensics: Towards Hybrid-Intelligent Crime Investigation

Katrin Franke, Sargur N. Srihari
2007 Third International Symposium on Information Assurance and Security  
This paper gives a brief overview of the potential of computational methods in forensics.  ...  Computer-based methods have also become important tools for performing certain forensic functions. Yet, knowledge and intuition of the human expert plays a central role.  ...  , outliers in a cluster, -Robotics: where human movements are replicated by a machine, and -Machine Learning: where a mathematical model is learnt from examples.  ... 
doi:10.1109/isias.2007.4299803 fatcat:vuf4vlggd5gevdubez3iezplwm

Forensic Economics

Eric Zitzewitz
2012 Journal of Economic Literature  
A follow-up study in Uganda to assess the permanency of the media's effect there would be useful.  ...  I then turn to some of the higher-level issues that the relative success of academic forensic economics work raises. What Do We Learn from Forensic Economics?  ... 
doi:10.1257/jel.50.3.731 fatcat:4gvluibxonfq3htldmoqotejjy
« Previous Showing results 1 — 15 out of 8,396 results