咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 16 篇 计算机科学与技术...
    • 4 篇 材料科学与工程(可...
    • 2 篇 仪器科学与技术
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 公安技术
    • 1 篇 机械工程
    • 1 篇 电气工程
    • 1 篇 化学工程与技术
    • 1 篇 环境科学与工程(可...
  • 8 篇 医学
    • 6 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 6 篇 法学
    • 3 篇 社会学
    • 2 篇 公安学
    • 1 篇 法学
  • 6 篇 理学
    • 4 篇 化学
    • 3 篇 生物学
    • 2 篇 数学
    • 1 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 历史学
    • 1 篇 世界史
  • 1 篇 农学
    • 1 篇 兽医学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 33 篇 forensics
  • 4 篇 detection
  • 3 篇 image
  • 3 篇 blockchain
  • 3 篇 digital
  • 3 篇 security
  • 2 篇 analysis
  • 2 篇 next-generation ...
  • 2 篇 forensic
  • 2 篇 tamper
  • 2 篇 witness
  • 2 篇 expert
  • 2 篇 identity
  • 1 篇 computer
  • 1 篇 strangeness
  • 1 篇 reliability
  • 1 篇 gain
  • 1 篇 clustering
  • 1 篇 semi-supervised
  • 1 篇 dibr

机构

  • 1 篇 department of co...
  • 1 篇 east medicine un...
  • 1 篇 quinnipiac unive...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 school of intell...
  • 1 篇 institute of tec...
  • 1 篇 aengineering res...
  • 1 篇 professor of com...
  • 1 篇 university of ne...
  • 1 篇 fraunhofer insti...
  • 1 篇 department of he...
  • 1 篇 department of au...
  • 1 篇 school of comput...
  • 1 篇 forensic assessm...
  • 1 篇 university of ch...
  • 1 篇 department of nu...
  • 1 篇 department of ma...
  • 1 篇 NOT FOUND
  • 1 篇 department of co...

作者

  • 2 篇 jiangwei yan
  • 1 篇 xiangyang luo
  • 1 篇 urs broderick fu...
  • 1 篇 shanghai
  • 1 篇 na huang
  • 1 篇 qi han
  • 1 篇 jun zhang
  • 1 篇 carsten rudolph
  • 1 篇 qilin yin
  • 1 篇 rose constantino
  • 1 篇 xuejiao wan
  • 1 篇 barbara endicott...
  • 1 篇 rogerio nogueira...
  • 1 篇 samera otor
  • 1 篇 yi-li wu
  • 1 篇 lynda tiefel
  • 1 篇 lianhai wang
  • 1 篇 simone borges br...
  • 1 篇 shweta tripathi
  • 1 篇 ji-hui liu

语言

  • 31 篇 英文
  • 2 篇 中文
检索条件"主题词=Forensics"
33 条 记 录,以下是1-10 订阅
排序:
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image forensics.Despite the existence of various methods capable of detecting double Joint Photographic Experts Group(JP... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Application of Microbiome in forensics
收藏 引用
Genomics, Proteomics & Bioinformatics 2023年 第1期21卷 97-107页
作者: Jun Zhang Wenli Liu Halimureti Simayijiang Ping Hu Jiangwei Yan School of Forensic Medicine Shanxi Medical UniversityTaiyuan 030001China Beijing Center for Physical and Chemical Analysis Beijing 100089China Key Laboratory of Environment and Health(HUST) Ministry of Education&Ministry of Environmental Protectionand State Key Laboratory of Environmental Health(Incubation)School of Public HealthTongji Medical CollegeHuazhong University of Science and TechnologyWuhan 430074China
Recent advances in next-generation sequencing technologies and improvements in bioinformatics have expanded the scope of microbiome analysis as a forensic tool.Microbiome research is concerned with the study of the co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Research on Metaverse Security and forensics
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 799-825页
作者: Guangjun Liang Jianfang Xin Qun Wang Xueli Ni Xiangmin Guo Pu Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data forensics Analysis NanjingChina Key Laboratory of Digital forensics Department of Public Security of Jiangsu ProvinceNanjingChina School of Intelligent Engineering Nanjing Institute of Railway TechnologyNanjingChina
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment circles.However,while the metaverse brings ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
WIDE:A witness-based data priority mechanism for vehicular forensics
收藏 引用
Blockchain(Research and Applications) 2022年 第2期3卷 15-24页
作者: Chuka Ohama Regio A.Michelin Raja Jurdak Salil S.Kanhere Sanjay Jha University of New South Wales(UNSW) SydneyNSW 2052Australia Queensland University of Technology(QUT) BrisbaneQLD 4000Australia
In this paper,we present a WItness based Data priority mEchanism(WIDE)for vehicles in the vicinity of an accident to facilitate liability decisions.WIDE evaluates the integrity of data generated by these vehicles,call... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Ensuring the Authenticity and Non-Misuse of Data Evidence in Digital forensics
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2015年 第1期22卷 85-90页
作者: Jingsha He Gongzheng Liu Bin Zhao Xuejiao Wan Na Huang School of Software Engineering Beijing University of Technology Dept. of Computer Science Jining University State Key Laboratory of Digital Publishing Technology Peking University Founder Group Co.Ltd
In forensic investigations,it is vital that the authenticity of digital evidence should be ensured. In addition,technical means should be provided to ensure that digital evidence collected cannot be misused for the pu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Security and Privacy in the Computer forensics Context
Security and Privacy in the Computer Forensics Context
收藏 引用
2006 10th International Conference on Communication Technology(ICCT 2006)
作者: S.Srinivasan Professor of Computer Information Systems Director Center for Information Assurance University of Louisville Louisville Kentucky 40292 USA
Today computers are used in numerous day-to-day activities as a communications tool. In this regard several different applications are used to generate and store important documents. These documents contain vital data... 详细信息
来源: cnki会议 评论
Blockchain⁃Based Log Verification System for Cloud forensics
收藏 引用
Journal of Donghua University(English Edition) 2021年 第5期38卷 449-458页
作者: AGBEDANU Promise Ricardo 王鹏伟 雷颖慧 NORTEY Richard N RASOOL Abdul ODARTEY Lamptey K School of Computer Science and Technology Donghua UniversityShanghai 201620China
In this age when most organizations make use of cloud computing,it is important to not only protect cloud computing resources from cyber⁃attacks but also investigate these attacks.During forensic investigations in a c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Vulnerability Analysis of MEGA Encryption Mechanism
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 817-829页
作者: Qingbing Ji Zhihong Rao Lvlin Ni Wei Zhao Jing Fu School of Cybersecurity Northwestern Polytechnical UniversityXi’an710072China No.30 Institute of CETC Chengdu610041China Eberly College of Science Pennsylvania State University-University ParkPA16802USA
MEGA is an end-to-end encrypted cloud storage platform controlled by users.Moreover,the communication between MEGA client and server is carried out under the protection of Transport Layer Security(TLS)encryption,it is... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Metaheuristics with Optimal Deep Transfer Learning Based Copy-Move Forgery Detection Technique
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 881-899页
作者: C.D.Prem Kumar S.Saravana Sundaram Department of Information Technology Hindusthan College of Engineering and TechnologyCoimbatore641032TamilnaduIndia Department of Electrical and Electronics Engineering Hindusthan College of Engineering and TechnologyCoimbatore641032TamilnaduIndia
The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content.An effective technique for tampering the identification is the copy-mo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Survey of Blind forensics Techniques for JPEG Image Tampering
收藏 引用
Journal of Computer and Communications 2019年 第10期7卷 1-13页
作者: Xueling Chu Haiming Li College of Computer Science and Technology Shanghai University of Electric Power Shanghai China
Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论