Filters








12,039 Hits in 5.2 sec

Identifying Trace Evidence from Target-Specific Data Wiping Application Software

Gregory Carlton, Gary Kessler
2012 Journal of Digital Forensics, Security and Law  
We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application  ...  This study was undertaken to analyze a subset of these tools in order to identify trace evidence, if any, left behind on disk media after executing these applications.  ...  Regshot analysis We used the Regshot utility to capture and compare a snapshot of the Windows Registry for the pre-experiment image and each of the post-experiment images.  ... 
doi:10.15394/jdfsl.2012.1122 fatcat:zp6m53gsxjebtlhsyb4onlfesm

DEVELOPING A CLOUD-BASED ONLINE GEOSPATIAL INFORMATION SHARING AND GEOPROCESSING PLATFORM TO FACILITATE COLLABORATIVE EDUCATION AND RESEARCH

Z. L. Yang, J. Cao, K. Hu, Z. P. Gui, H. Y. Wu, L. You
2016 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
Efficient online discovering and applying geospatial information resources (GIRs) is critical in Earth Science domain as while for cross-disciplinary applications.  ...  To support interactive teaching and training, GeoSquare adopts the rich internet application (RIA) technology to create user-friendly graphical user interface (GUI).  ...  Users can upload their geodata and download the geoprocessing historical data. The registry center provides three levels of resource management and sharing scopes including public, group and private.  ... 
doi:10.5194/isprsarchives-xli-b6-3-2016 fatcat:axgr5ogjgjfwhc3ssbdqd6u6se

DEVELOPING A CLOUD-BASED ONLINE GEOSPATIAL INFORMATION SHARING AND GEOPROCESSING PLATFORM TO FACILITATE COLLABORATIVE EDUCATION AND RESEARCH

Z. L. Yang, J. Cao, K. Hu, Z. P. Gui, H. Y. Wu, L. You
2016 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
Efficient online discovering and applying geospatial information resources (GIRs) is critical in Earth Science domain as while for cross-disciplinary applications.  ...  To support interactive teaching and training, GeoSquare adopts the rich internet application (RIA) technology to create user-friendly graphical user interface (GUI).  ...  Users can upload their geodata and download the geoprocessing historical data. The registry center provides three levels of resource management and sharing scopes including public, group and private.  ... 
doi:10.5194/isprs-archives-xli-b6-3-2016 fatcat:c66qi7jmurh7hc24zp6jklrfre

DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning

Thien-Phuc Doan, Souhwan Jung
2022 Computers Materials & Continua  
We introduce DAVS-A Dockerfile analysis-based vulnerability scanning framework for OCI-based container images to deal with the limitations of existing solutions.  ...  However, containers face a diversity of threats caused by vulnerable packages within container images. Previous vulnerability scanning solutions for container images are inadequate.  ...  Acknowledgement: This work is the extended work of "DAVS: Dockerfile Analysis for Vulnerable Scanning" in MobiSec 2021: The 5th International Symposium on Mobile Internet Security, Jeju Island, South Korea  ... 
doi:10.32604/cmc.2022.025096 fatcat:6bijtysf3negpcbrztly65o2vq

Japanese Virtual Observatory (JVO) as an advanced astronomical research enviroment [article]

Y.Shirasaki, M.Tanaka, S.Kawanomoto, S.Honda, M.Ohishi, Y.Mizumoto, N.Yasuda, Y.Masunaga, Y.Ishihara, J.Tsutsumi, H.Nakamoto, Y.Kobayashi, M.Sakamoto
2006 arXiv   pre-print
The toolkit for building the ADQL-based service is released to the public on the JVO web site.  ...  We have developed five components for constructing the portal: (1) registry, (2) data service, (3) workflow system, (4) data analysis service (5) portal GUI.  ...  ACKNOWLEDGMENTS This work was supported by the JSPS Core-to-Core Program, Grant-in-aid for Information Science (15017289 and 16016292) and Young Scientists (B) (17700085) carried out by the Ministry of  ... 
arXiv:astro-ph/0604593v1 fatcat:de4zyoadrjfm7j7wfr54kcnb3q

Cancer information resources: digital and online sources

Theodore B Junghans, Imogene F Sevin, Boris Ionin, Harold Seifried
2004 Toxicology  
These Internet sources of cancer information address the needs of toxicologists, environmental and occupational health scientists, cancer researchers and clinicians, government regulators, the public,  ...  The Internet is becoming an increasingly important source of information on cancer.  ...  with cancer in finding resources on the Internet.  ... 
doi:10.1016/j.tox.2004.02.021 pmid:15138041 fatcat:ar7uqp7cgzdztcsrq73mitnxqu

Cancer information resources: digital and online sources

Theodore B Junghans, Imogene F Sevin, Boris Ionin, Harold Seifried
2002 Toxicology  
These Internet sources of cancer information address the needs of toxicologists, environmental and occupational health scientists, cancer researchers and clinicians, government regulators, the public,  ...  The Internet is becoming an increasingly important source of information on cancer.  ...  with cancer in finding resources on the Internet.  ... 
doi:10.1016/s0300-483x(02)00020-3 pmid:11955682 fatcat:vp45553fsjcudbc6pmkf3r3cuy

MRI-based morphometric analysis of typical and atypical brain development

David N. Kennedy, Christian Haselgrove, Sean McInerney
2003 Mental Retardation and Developmental Disabilities Research Reviews  
Rapid advancement in image acquisition methods, image analysis tools and interpretation of morphometric results make the study of in vivo anatomic analysis both challenging and rewarding.  ...  This paper will briefly cover the methods of morphometric analysis that available for neuroanatomic analysis, and tour some sample results from a prototype retrospective database of neuroanatomic volumetric  ...  -Harvard Foundation for Advanced Scientific Research.  ... 
doi:10.1002/mrdd.10075 pmid:12953294 fatcat:6n24qx5zrnhfbmfyhegu75nwmm

Knowledge Engineering for PharmacoGenomic Molecular Imaging of the Brain

Carl Taswell
2009 2009 Fifth International Conference on Semantics, Knowledge and Grid  
Therefore, knowledge engineering with effective software tools and applications built upon a semantic-enabled informatics infrastructure remains a necessary prerequisite to facilitate a reduction of those  ...  This research, involving pharmacogenomic molecular imaging of the brain, will be extremely costly in many ways.  ...  image analysis.  ... 
doi:10.1109/skg.2009.101 dblp:conf/skg/Taswell09 fatcat:stgkyvelurgwbhmmaz6x6g3jii

Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems

Muhammad Raheel Arshad, Mehdi Hussain, Hasan Tahir, Sana Qadir, Faraz Iqbal Memon, Yousra Javed
2021 IEEE Access  
In the first phase, registry snapshots were analyzed for all our targeted activities while memory and storage images were analyzed in the next two phases. 1) REGISTRY ANALYSIS In Windows forensic investigations  ...  HxD and Belkasoft Evidence Center are used for forensics analysis of acquired memory images. A list of all recovered artifacts during this phase of memory analysis is given in Table 5 .  ...  In application-related traces, we found application-related file paths, loaded application files, functions, resources, SQLite DB Tables and operations, Tor control port, routers info, circuit Info, public  ... 
doi:10.1109/access.2021.3119724 fatcat:6uyxs6lq4neklk7akaga2u37sa

Forensic Analysis of Popular Chinese Internet Applications [chapter]

Ying Yang, Kam-Pui Chow, Lucas Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Chen
2010 IFIP Advances in Information and Communication Technology  
When the Digital Evidence Search Kit (DESK) was first used in Mainland China, it was found to be inadequate because it did not support criminal investigations involving popular Internet applications such  ...  This paper discusses the enhancements made to DESK to conduct forensic analyses of QQ, MSN and Foxmail.  ...  The examination of the forensic image revealed more than ten QQ accounts. Enhanced DESK was then used to extract QQrelated information. The recovered chat logs were saved to a .txt file for analysis.  ... 
doi:10.1007/978-3-642-15506-2_20 fatcat:ia4eowltkbh4jhsr2xtn2ahzia

Detecting Environment-Sensitive Malware [chapter]

Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti
2011 Lecture Notes in Computer Science  
The execution of malware in an instrumented sandbox is a widespread approach for the analysis of malicious code, largely because it sidesteps the difficulties involved in the static analysis of obfuscated  ...  We implement the proposed techniques in a tool called Disarm, and demonstrate that it can accurately detect evasive malware, leading to the discovery of previously unknown evasion techniques.  ...  The research leading to these results has received funding from the European Union Seventh Framework Programme under grant agreement n. 257007 (SysSec), from the Prevention, Preparedness and Consequence  ... 
doi:10.1007/978-3-642-23644-0_18 fatcat:rdoo4fbc7bcnjk4wq6qznxrnwm

JIB.tools 2.0 – A Bioinformatics Registry for Journal Published Tools with Interoperability to bio.tools

Marcel Friedrichs, Alban Shoshi, Piotr Jaroslaw Chmura, Jon Ison, Veit Schwämmle, Falk Schreiber, Ralf Hofestädt, Bjorn Sommer
2019 Journal of Integrative Bioinformatics  
With newer registries like bio.tools providing these information on a bigger scale, JIB.tools 2.0 closes the gap between journal publications and registry publication. (Reference: https://jib.tools).  ...  As soon as a new tool-related publication is published in JIB, the tool is posted to JIB.tools and can afterwards be easily transferred to bio.tools, a large information repository of software tools, databases  ...  All authors have read the journal's Publication ethics and publication malpractice statement available at the journal's website and hereby confirm that they comply with all its parts applicable to the  ... 
doi:10.1515/jib-2019-0059 pmid:31913853 pmcid:PMC7074141 fatcat:jwa7drfhu5bfpnqj5sq2rr7d5e

Poster abstracts / Résumés d'affiches

2014 Journal of the Canadian Health Libraries Association  
The search aimed to identify resources for the Registry of Methods and Tools, a product of the National Collaborating Centre for Methods and Tools.  ...  The registry identifies and describes resources for knowledge translation, making them easier for busy public health professionals to find and use. Methods.  ...  'Learning after' was critical with a plan for evaluation of the roles, processes and tools used to share and document the literature search tracking process. Discussion.  ... 
doi:10.5596/c13-036 fatcat:d7jrs5afyfflzhos5h7cyllcym

Poster abstracts / Résumés d'affiches

Kaitryn Campbell
2014 Journal of the Canadian Health Libraries Association  
The search aimed to identify resources for the Registry of Methods and Tools, a product of the National Collaborating Centre for Methods and Tools.  ...  The registry identifies and describes resources for knowledge translation, making them easier for busy public health professionals to find and use. Methods.  ...  'Learning after' was critical with a plan for evaluation of the roles, processes and tools used to share and document the literature search tracking process. Discussion.  ... 
doi:10.5596/c2012-016 fatcat:mzw5kgur2ffafpk7ytlxzuaori
« Previous Showing results 1 — 15 out of 12,039 results