A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Identifying Trace Evidence from Target-Specific Data Wiping Application Software
2012
Journal of Digital Forensics, Security and Law
We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application ...
This study was undertaken to analyze a subset of these tools in order to identify trace evidence, if any, left behind on disk media after executing these applications. ...
Regshot analysis We used the Regshot utility to capture and compare a snapshot of the Windows Registry for the pre-experiment image and each of the post-experiment images. ...
doi:10.15394/jdfsl.2012.1122
fatcat:zp6m53gsxjebtlhsyb4onlfesm
DEVELOPING A CLOUD-BASED ONLINE GEOSPATIAL INFORMATION SHARING AND GEOPROCESSING PLATFORM TO FACILITATE COLLABORATIVE EDUCATION AND RESEARCH
2016
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Efficient online discovering and applying geospatial information resources (GIRs) is critical in Earth Science domain as while for cross-disciplinary applications. ...
To support interactive teaching and training, GeoSquare adopts the rich internet application (RIA) technology to create user-friendly graphical user interface (GUI). ...
Users can upload their geodata and download the geoprocessing historical data. The registry center provides three levels of resource management and sharing scopes including public, group and private. ...
doi:10.5194/isprsarchives-xli-b6-3-2016
fatcat:axgr5ogjgjfwhc3ssbdqd6u6se
DEVELOPING A CLOUD-BASED ONLINE GEOSPATIAL INFORMATION SHARING AND GEOPROCESSING PLATFORM TO FACILITATE COLLABORATIVE EDUCATION AND RESEARCH
2016
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Efficient online discovering and applying geospatial information resources (GIRs) is critical in Earth Science domain as while for cross-disciplinary applications. ...
To support interactive teaching and training, GeoSquare adopts the rich internet application (RIA) technology to create user-friendly graphical user interface (GUI). ...
Users can upload their geodata and download the geoprocessing historical data. The registry center provides three levels of resource management and sharing scopes including public, group and private. ...
doi:10.5194/isprs-archives-xli-b6-3-2016
fatcat:c66qi7jmurh7hc24zp6jklrfre
DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning
2022
Computers Materials & Continua
We introduce DAVS-A Dockerfile analysis-based vulnerability scanning framework for OCI-based container images to deal with the limitations of existing solutions. ...
However, containers face a diversity of threats caused by vulnerable packages within container images. Previous vulnerability scanning solutions for container images are inadequate. ...
Acknowledgement: This work is the extended work of "DAVS: Dockerfile Analysis for Vulnerable Scanning" in MobiSec 2021: The 5th International Symposium on Mobile Internet Security, Jeju Island, South Korea ...
doi:10.32604/cmc.2022.025096
fatcat:6bijtysf3negpcbrztly65o2vq
Japanese Virtual Observatory (JVO) as an advanced astronomical research enviroment
[article]
2006
arXiv
pre-print
The toolkit for building the ADQL-based service is released to the public on the JVO web site. ...
We have developed five components for constructing the portal: (1) registry, (2) data service, (3) workflow system, (4) data analysis service (5) portal GUI. ...
ACKNOWLEDGMENTS This work was supported by the JSPS Core-to-Core Program, Grant-in-aid for Information Science (15017289 and 16016292) and Young Scientists (B) (17700085) carried out by the Ministry of ...
arXiv:astro-ph/0604593v1
fatcat:de4zyoadrjfm7j7wfr54kcnb3q
Cancer information resources: digital and online sources
2004
Toxicology
These Internet sources of cancer information address the needs of toxicologists, environmental and occupational health scientists, cancer researchers and clinicians, government regulators, the public, ...
The Internet is becoming an increasingly important source of information on cancer. ...
with cancer in finding resources on the Internet. ...
doi:10.1016/j.tox.2004.02.021
pmid:15138041
fatcat:ar7uqp7cgzdztcsrq73mitnxqu
Cancer information resources: digital and online sources
2002
Toxicology
These Internet sources of cancer information address the needs of toxicologists, environmental and occupational health scientists, cancer researchers and clinicians, government regulators, the public, ...
The Internet is becoming an increasingly important source of information on cancer. ...
with cancer in finding resources on the Internet. ...
doi:10.1016/s0300-483x(02)00020-3
pmid:11955682
fatcat:vp45553fsjcudbc6pmkf3r3cuy
MRI-based morphometric analysis of typical and atypical brain development
2003
Mental Retardation and Developmental Disabilities Research Reviews
Rapid advancement in image acquisition methods, image analysis tools and interpretation of morphometric results make the study of in vivo anatomic analysis both challenging and rewarding. ...
This paper will briefly cover the methods of morphometric analysis that available for neuroanatomic analysis, and tour some sample results from a prototype retrospective database of neuroanatomic volumetric ...
-Harvard Foundation for Advanced Scientific Research. ...
doi:10.1002/mrdd.10075
pmid:12953294
fatcat:6n24qx5zrnhfbmfyhegu75nwmm
Knowledge Engineering for PharmacoGenomic Molecular Imaging of the Brain
2009
2009 Fifth International Conference on Semantics, Knowledge and Grid
Therefore, knowledge engineering with effective software tools and applications built upon a semantic-enabled informatics infrastructure remains a necessary prerequisite to facilitate a reduction of those ...
This research, involving pharmacogenomic molecular imaging of the brain, will be extremely costly in many ways. ...
image analysis. ...
doi:10.1109/skg.2009.101
dblp:conf/skg/Taswell09
fatcat:stgkyvelurgwbhmmaz6x6g3jii
Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems
2021
IEEE Access
In the first phase, registry snapshots were analyzed for all our targeted activities while memory and storage images were analyzed in the next two phases.
1) REGISTRY ANALYSIS In Windows forensic investigations ...
HxD and Belkasoft Evidence Center are used for forensics analysis of acquired memory images. A list of all recovered artifacts during this phase of memory analysis is given in Table 5 . ...
In application-related traces, we found application-related file paths, loaded application files, functions, resources, SQLite DB Tables and operations, Tor control port, routers info, circuit Info, public ...
doi:10.1109/access.2021.3119724
fatcat:6uyxs6lq4neklk7akaga2u37sa
Forensic Analysis of Popular Chinese Internet Applications
[chapter]
2010
IFIP Advances in Information and Communication Technology
When the Digital Evidence Search Kit (DESK) was first used in Mainland China, it was found to be inadequate because it did not support criminal investigations involving popular Internet applications such ...
This paper discusses the enhancements made to DESK to conduct forensic analyses of QQ, MSN and Foxmail. ...
The examination of the forensic image revealed more than ten QQ accounts. Enhanced DESK was then used to extract QQrelated information. The recovered chat logs were saved to a .txt file for analysis. ...
doi:10.1007/978-3-642-15506-2_20
fatcat:ia4eowltkbh4jhsr2xtn2ahzia
Detecting Environment-Sensitive Malware
[chapter]
2011
Lecture Notes in Computer Science
The execution of malware in an instrumented sandbox is a widespread approach for the analysis of malicious code, largely because it sidesteps the difficulties involved in the static analysis of obfuscated ...
We implement the proposed techniques in a tool called Disarm, and demonstrate that it can accurately detect evasive malware, leading to the discovery of previously unknown evasion techniques. ...
The research leading to these results has received funding from the European Union Seventh Framework Programme under grant agreement n. 257007 (SysSec), from the Prevention, Preparedness and Consequence ...
doi:10.1007/978-3-642-23644-0_18
fatcat:rdoo4fbc7bcnjk4wq6qznxrnwm
JIB.tools 2.0 – A Bioinformatics Registry for Journal Published Tools with Interoperability to bio.tools
2019
Journal of Integrative Bioinformatics
With newer registries like bio.tools providing these information on a bigger scale, JIB.tools 2.0 closes the gap between journal publications and registry publication. (Reference: https://jib.tools). ...
As soon as a new tool-related publication is published in JIB, the tool is posted to JIB.tools and can afterwards be easily transferred to bio.tools, a large information repository of software tools, databases ...
All authors have read the journal's Publication ethics and publication malpractice statement available at the journal's website and hereby confirm that they comply with all its parts applicable to the ...
doi:10.1515/jib-2019-0059
pmid:31913853
pmcid:PMC7074141
fatcat:jwa7drfhu5bfpnqj5sq2rr7d5e
Poster abstracts / Résumés d'affiches
2014
Journal of the Canadian Health Libraries Association
The search aimed to identify resources for the Registry of Methods and Tools, a product of the National Collaborating Centre for Methods and Tools. ...
The registry identifies and describes resources for knowledge translation, making them easier for busy public health professionals to find and use. Methods. ...
'Learning after' was critical with a plan for evaluation of the roles, processes and tools used to share and document the literature search tracking process. Discussion. ...
doi:10.5596/c13-036
fatcat:d7jrs5afyfflzhos5h7cyllcym
Poster abstracts / Résumés d'affiches
2014
Journal of the Canadian Health Libraries Association
The search aimed to identify resources for the Registry of Methods and Tools, a product of the National Collaborating Centre for Methods and Tools. ...
The registry identifies and describes resources for knowledge translation, making them easier for busy public health professionals to find and use. Methods. ...
'Learning after' was critical with a plan for evaluation of the roles, processes and tools used to share and document the literature search tracking process. Discussion. ...
doi:10.5596/c2012-016
fatcat:mzw5kgur2ffafpk7ytlxzuaori
« Previous
Showing results 1 — 15 out of 12,039 results