Search results for "Digital forensics"

showing 8 items of 8 documents

Strukturētu datu grafu vizualizācija virtuālā realitātē kā rīks lai asistētu noziegumu digitālā izmeklēšanā

2022

Maģistra darbā „Strukturētu datu grafu vizualizācija virtuālā realitātē kā rīks lai asistētu noziegumu digitālā izmeklēšanā” tiek apskatīti pētījumi par datu apstrādes metodēm digitālā izmeklēšanā un datu attēlošanas paņēmieniem. Darba mērķis ir, balstoties uz pētījumu analīzi, izstrādāt reālus un funkcionējošus, divus savstarpēji atkarīgus, rīku prototipus, kas veiktu kriminālprocesa laikā izgūto datu apstrādi, izveidojot starp tām saistības, vienā un veiktu skaidru un saprotamu apstrādāto datu attēlošanu otrā.

Datu attēlošanaData processingDigital forensicsDatorzinātneDatu apstrādeDigitālā izmeklēšana
researchProduct

An Ontology-Based Approach for the Reconstruction and Analysis of Digital Incidents Timelines

2015

International audience; Due to the democratisation of new technologies, computer forensics investigators have to deal with volumes of data which are becoming increasingly large and heterogeneous. Indeed, in a single machine, hundred of events occur per minute, produced and logged by the operating system and various software. Therefore, the identification of evidence, and more generally, the reconstruction of past events is a tedious and time-consuming task for the investigators. Our work aims at reconstructing and analysing automatically the events related to a digital incident, while respecting legal requirements. To tackle those three main problems (volume, heterogeneity and legal require…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI][INFO.INFO-WB] Computer Science [cs]/WebComputer scienceOntology PopulationDigital forensics[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH][ INFO.INFO-WB ] Computer Science [cs]/Web02 engineering and technologyEvent ReconstructionOntology (information science)[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]SoftwareKnowledge extraction[INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY]020204 information systemsForensic OntologyTimeline Analysis0202 electrical engineering electronic engineering information engineering[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]Event reconstructionKnowledge Extractionbusiness.industry[INFO.INFO-WB]Computer Science [cs]/WebTimelineComputer forensicsData scienceComputer Science Applications[ INFO.INFO-CY ] Computer Science [cs]/Computers and Society [cs.CY][INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]Medical Laboratory TechnologyIdentification (information)Digital Forensics[INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY][ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]020201 artificial intelligence & image processingbusinessLaw
researchProduct

Event Reconstruction

2014

Event reconstruction is one of the most important step in digital forensic investigations. It allows investigators to have a clear view of the events that have occurred over time. Event reconstruction is a complex task which requires exploration of a large amount of events due to the pervasiveness of new technologies nowadays. Any evidence produced at the end of the investigative process must also meet the requirements of the courts, such as reproducibility, verifiability, validation, etc. After defining the most important concepts of event reconstruction, a survey of the challenges of this field and solutions proposed so far is given in this chapter. Irish Research Council Science Foundati…

EngineeringDigital ForensicEmerging technologiesProcess (engineering)[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Digital forensicsEvent Reconstruction02 engineering and technologyField (computer science)Task (project management)[INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY]020204 information systemsMachine learning0202 electrical engineering electronic engineering information engineeringEvent reconstructionbusiness.industryStatisticsDigital holography020207 software engineeringData science[ INFO.INFO-CY ] Computer Science [cs]/Computers and Society [cs.CY][INFO.INFO-OH] Computer Science [cs]/Other [cs.OH][INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY]Terahertz imaging[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]State (computer science)businessSparsity
researchProduct

Automatic Timeline Construction and Analysis For Computer Forensics Purposes

2014

International audience; To determine the circumstances of an incident, investigators need to reconstruct events that occurred in the past. The large amount of data spread across the crime scene makes this task very tedious and complex. In particular, the analysis of the reconstructed timeline, due to the huge quantity of events that occurred on a digital system, is almost impossible and leads to cognitive overload. Therefore, it becomes more and more necessary to develop automatic tools to help or even replace investigators in some parts of the investigation. This paper introduces a multi-layered architecture designed to assist the investigative team in the extraction of information left in…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]Computer science[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Digital forensicsEvent ReconstructionOntology (information science)Computer securitycomputer.software_genre[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Task (project management)[INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY]Timeline AnalysisCrime scene[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]Event reconstructionOntologyTimelineComputer forensics16. Peace & justiceData science[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH][ INFO.INFO-CY ] Computer Science [cs]/Computers and Society [cs.CY]Digital Forensics[INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY][ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]computerCognitive load
researchProduct

State of the art in passive digital image forgery detection: copy-move image forgery

2017

Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is cop…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCopyingCopy-move forgery Digital forensics Duplicated detection Manipulation detectionbusiness.industryComputer sciencemedia_common.quotation_subjectDigital forensicsComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyImage (mathematics)Digital imageArtificial IntelligenceOriginalityPattern recognition (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionRelevance (information retrieval)Computer Vision and Pattern RecognitionArtificial intelligenceState (computer science)businessmedia_commonPattern Analysis and Applications
researchProduct

PROVA TECNICA E CONTRADDITTORIO NEL PROCESSO PENALE

2023

When science and the criminal process come into contact, cognitive mechanisms are set in motion aimed at reorganizing knowledge belonging to worlds other than the legal one. In this context, the actors of the trial scene are forced to move on a hybrid terrain in which judicial epistemology and scientific epistemology mix. Such a fascinating picture pushes the scholar of the criminal process to seek interpretations suitable for explaining the multiple dilemmas that the phenomenon entails. Starting from a historical-legislative excursus of the expert evidence, the proposed analysis examines the different channels through which expert knowledge enters the process, starting from the investigati…

Expert witness right to confrontation cross examination scientific epistemology judicial epistemology digital forensics forensic genetics investigations best practices freedoms and fundamental rights of the person BARD system of the controls of the decisionSettore IUS/16 - Diritto Processuale Penale
researchProduct

A roadmap towards improving managed security services from a privacy perspective

2014

Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacymanaged security servicesPrivacy by Designbusiness.industryComputer scienceDigital forensicsBig dataethical awarenesssecurityIntrusion detection systemLibrary and Information SciencesprivacyComputer securitycomputer.software_genreComputer Science ApplicationsOutsourcingInformation sensitivityintrusion detection and prevention systemsoutsourcingbusinesscomputerRegister of data controllersEthics and Information Technology
researchProduct

The Law of Service Robots

2014

Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…

Robots drones remotely piloted aerial systems ENAC liability privacy data protection commons intellectual property digital forensics cyber-security criminal liabilitySettore IUS/01 - Diritto Privato
researchProduct